Describe your thoughts about what professionalism

Assignment Help Computer Engineering
Reference no: EM131720867

Explain the relationship between "code of ethics" and "professionalism" in an IT environment.

Describe your thoughts about what "professionalism" would mean to someone who is in the role of network administrator.

How would that compare to someone who was a systems analyst or a programmer?

There are often reports of unprofessional acts by someone in IT that have significant implications for organizations.

Research reports of unprofessional behavior by someone in IT and discuss whether their behavior was unethical, illegal, or socially responsible.

One such example would be data theft by an employee.

Discuss an example situation of someone in an IT role that lacked professionalism or violated a "code of ethics". Identify whether your example was socially, ethically or legally irresponsible.

Reference no: EM131720867

Questions Cloud

Develop the medical records policy : As required by law, every health care facility must maintain a medical record for each patient that it treats (Pozgar, 2004).
Describe the administrative management practices : Describe the administrative management practices of separation of duties, job rotation, and mandatory vacations and their role within
Equation of an ellipse in standard form : Can you help me figure out the equation of an ellipse in standard form. Say for example the problem is the major axis of the ellipse is vertical and it's length
Problem as a linear program : Formulate the following problem as a linear program, and solve using the Excel Solver. Report the optimal solution and profit.
Describe your thoughts about what professionalism : Describe your thoughts about what professionalism would mean to someone who is in the role of network administrator
What are the advantages of keeping a construction schedule : Who on the contractors team should do the updating (project manager, superintendent, estimator, or project engineer).
How can solve a quadratic function : How can solve a quadratic function f(x)=axsquared+bx+c? Say for example the problem was f(3)=22 f(-2)=17 and f(1)=2.
Discuss a current ethical issue in the business world : Discuss a current ethical issue in the business world that arises out of intellectual property.
Discuss your recommendations as to monitoring : they inquire how best to monitor the routed environment. Discuss your recommendations as to monitoring and managing this type of environment

Reviews

Write a Review

Computer Engineering Questions & Answers

  What kinds of network devices does the packet pass through

What kinds of network devices does the packet pass through.

  Write a subroutine addabc that performs the given operation

COMP 2213X2- Explain why the following assembly language and RTL constructs are incorrect. Write a subroutine ADDABC that performs the operation C = A + B. Variables A, B, and C are all word (i.e., 16-bit) values.

  Write down logical description of the initial situatio

Write down logical description of the initial situatio .Write a sentence describing the Go action. Use a successor-state axiom.

  The aim of this project is to exercise and test your

the aim of this project is to exercise and test your ability to read and understand descriptions of data formats and to

  Sketch a diode transistor nand circuit

Sketch a diode-transistor NAND circuit and explain the operation of the circuit. - Explain the concept of minimum β and the purpose of the pull-down resistor.

  Network that contains several netware 4.11 servers

Your company has a network that contains several NetWare 4.11 servers and uses IPX as the routing protocol. Each of the network segments has as a minimum  one NetWare server on it. Which of the following responds to a Get Nearest Server (GNS) reque..

  What is a possible downside of making such a choice

The mainframe currently only connects to terminals, but management wants to be able to access it from  desktop. You run a token ring network. The mainframe manufacturer supports Ethernet, but not token ring. maintain an outline of possible solutio..

  Implement the code necessary to transfer data from the store

In class miniproject1.mongoDb.BulkTransfer, implement the code necessary to transfer data from the stored JSON files in your MongoDB instance on mLab.

  Explain what the network access server nas would do when

a describe what the network access server nas would do when receiving a reject message when there are two

  Identify tools used in the forensics data collection process

Identify tools used in the forensics data collection process. Your completed assignment should be at least two full double-spaced pages in length.

  1 the degreev of a pendant vertex may be either one or

1. the degreev of a pendant vertex may be either one or zero.nbspnbspnbspnbspnbsp tnbsp ornbsp fnbsp2. a tree is any

  What is the symbol for the enter key

What is the symbol for the "Enter" Key? Set the default location to your own folder that you created (your name, or ITM1270). Make auto correction so that if you type "toin", it will be corrected to " tion".

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd