Ethical concerns in computing

Assignment Help Basic Computer Science
Reference no: EM13787166

For the Final Paper, you will select one topic from the list below. Choose a topic that is important or interesting to you, and write a five- to seven-page paper about it.

Instructions for completing the Final Paper:

Please select from one of the following topics, which are addressed in the course textbook, Introduction to Computer Literacy:

Collaborative Technologies

Ethical Concerns in Computing

The Digital Divide

Open Source Software

The Impact of Mobile Computing

Social Networks

Protecting Copyrights and Intellectual Property

Plagiarism and Online Education

The Future of Cloud Computing

Return to the textbook, and review the pages in the chapter that pertain to your selected topic.

Log in to the Ashford University Library and conduct a search on that topic.

The INF103 tutorial will walk you through the basic steps of doing a search for scholarly sources within the Ashford University Library. A transcript of this video can be accessed through your online course.

Select two scholarly sources to use in your paper, in addition to the textbook. For each source, write down the author information, date of publication, title of the article, the publication information (journal title), and the database from which you retrieved the article. You will need this information when you create your references for the sources.

Begin the writing process. You are going to compare the points of view offered by these authors (the author of your textbook and the authors of the two scholarly sources you have selected) on your selected topic, and then offer your own point of view based upon your analysis of the readings.

The Ashford Writing Center (AWC) offers assistance with the writing process. The AWC contains many tutorials and offers online guides for how to develop an academic paper. Click on the Writing Center link under "Learning Resources" in the left navigation of this course to visit the AWC.

Reference no: EM13787166

Questions Cloud

Evidentiary process or analysis in digital forensic cases : Identify two reported cases that have impacted the evidentiary process or analysis in digital forensic cases; student will cite the case and summarize the issue before the court;
Identify the four basic financial statements : Identify the four basic financial statements. Describe the purpose of each of the four financial statements.
Entries required to properly record the sale : Prepare the entry for May 1, 2010. The bonds are sold on August 1, 2011 for $425,000 plus accrued interest. Prepare all entries required to properly record the sale.
Write an analytical report describing the impact of breach : The case study focuses on a major IT security breach that occurred in the recent past. Consider yourself as the IT person in charge at TJX. You need to analyze the case and describe the impacts of the breach on TJX.
Ethical concerns in computing : Please select from one of the following topics, which are addressed in the course textbook, Introduction to Computer Literacy: Collaborative Technologies, Ethical Concerns in Computing
Advantages of medicare : Medicare Advantages
Determine the target wacc : We can determine the target WACC for Apix Printing Inc., given these assumptions," she says as she hands you a piece of paper that says the following:
Why you should undergo cross-cultural training : uggest to your management team the main reason(s) why you should undergo cross-cultural training, and give an example of at least one type of training that could be effective for your international assignment.
Learning experience and application of knowledge : Assume you have the power to make reforms to the way tax research and planning is currently conducted. Propose the reforms you would make. Justify your response.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which method would be efficient for planning proactive

Process-centered review of object oriented software development methodologies, ACM Computing Surveys (CSUR), Volume 40 Issue 1, February 2008, Raman Ramsin, and Richard F. Paige.

  Location to be available in the new los angeles office

Network engineer for a small company with one local office in New York City. The company has been experiencing tremendous growth in the northeastern United States. As a result of this unprecedented growth, the company's management decides to es..

  Define a command can be sent to deactivate the tag

When this is used in an RFID tag, a command can be sent to deactivate the tag and can never be reactivated.

  Write a for loop that produces the following output

Write a for loop that produces the following output

  Why an organization prefer one approach over the other

As a system analyst, which would you prefer? Why? Can the two approaches be successfully combined? Explain. In all cases, support your analysis with specific examples from your readings, research, and professional experience (if applicable).

  Corporate embezzlement

Imagine you are employed by a large city police department as the leader of the digital forensics division. A large corporation in the city has contacted the police for assistance in investigating its concerns that the company Chief Financial Offi..

  Sorts rectangle objects

Sorts Rectangle objects

  How many and what type of domain controllers

How many and what type of domain controllers do you recommend for each campus? How would you justify this recommendation?

  Paper on human-computer interaction

Write a paper which is called Human-computer interaction

  Business uses networks-computers-support business functions

Think about a business you are familiar with, one which urilizes networks and computers to support business functions. Make a list of ten important, specific items like computers, disks.

  Discuss the role of incident containment in an incident

Discuss the role of incident containment in an incident response strategy and how a lack of planning for containment is a potential pitfall for any response strategy.

  Create statechart to balanced four parentheses

Create Statechart to balanced four parentheses.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd