Should the civil engineers be held accountable for any harm

Assignment Help Basic Computer Science
Reference no: EM131215458

Dependence on computers has intensified the division of labor within engineering. For example, civil engineers designing a flood control system have to rely on information and programs obtained from systems analysts and implemented by computer programmers. Suppose the systems analysts refuse to assume any moral or legal responsibility for the safety of the people affected by the flood control plans, arguing that they are merely providing tools whose use is entirely up to the engineers. Should the civil engineers be held accountable for any harm caused by poor computer programs? Presumably their accountability does extend to errors resulting from their own inadequate specifications that they supply to the computer experts. Yet should not the engineers also be expected to contract with computer specialists who agree to be partially accountable for the end-use effects of their programs?

Reference no: EM131215458

Questions Cloud

Problem regarding the human nature : How do Walter Rauschenbusch and Pope Pius X view human nature? How would this view affect their political viewpoints? What evidence from the fiveother documents would support or oppose the views of Rauschenbusch or Pius?
What is the change in length of the cylinder : Find the average shear stress in the bolt shown in the figure. Assume that the bolt's radius is 0.75" and it's subjected to a tensile force, F = 10 kips.
President in what unusual setting : After the death of President John F. Kennedy, Lyndon Johnson was sworn-in as President in what unusual setting?
Discussion of the role of women in society : Compare and contrast the Spartan and Athenian cultures. Be sure to include a discussion of the role of women in each society. The answer needs to be three full paragraphs and cited from the Frankfurter.
Should the civil engineers be held accountable for any harm : Yet should not the engineers also be expected to contract with computer specialists who agree to be partially accountable for the end-use effects of their programs?
Concerns of salvation religion : How is it different from other kinds of religions, especially regarding age and the family? How does Buddhist art and architecture reflect the concerns of salvation religion?
What context clues word choice or emphasis reveals the tone : How do you know? What context clues, word choice, or emphasis reveals this tone to you? How does it contribute to the argument?
Concerns of salvation religion : How is it different from other kinds of religions, especially regarding age and the family? How does Buddhist art and architecture reflect the concerns of salvation religion?
Influence the northern abolitionist movement : How did Gabriel Denmark Vesey and Nat Turner influence the northern abolitionist movement?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Use a temporary location t to store the intermediate results

Compare zero-, one, two-, and three- address machines by writing programs to compute.

  Estimate of the capm beta of commercial property

The market price of risk is 6% and the average risk-free rate has been 4%. What is the best estimate of the CAPM Beta of commercial property in Australia?

  What other snmp information might be considered sensitive

What other SNMP information might be considered sensitive?

  What are some questions that you might want to ask in return

A management application vendor boasts about the scale of its management system, claiming that it can support 10 million managed objects. What are some questions that you might want to ask in return

  Which statement about k-fold cross-validation is false

Which statement about k-fold cross-validation is FALSE?

  Database developer for a local college

Suppose that you are the database developer for a local college. The Chief Information Officer (CIO) has asked you to provide a summary of normalizing database tables that the IT staff will use in the upcoming training session.

  Write a brief statement on how you would address components

Assume that a security model is needed for the protection of information i your class. Using the CNSS model examine each of the cells and write a brief statement on how you would address the components represented in that cell.

  Balancing function and fashion

Error messages are a key part of an overall interface design strategy of guidance for the user. Discuss strategies to ensure integrated, coordinated error messages that are consistent across an application.

  Propose remedies the law provides for the violations

Propose remedies the law provides for the violations. Write a summary of your findings. Prior summarizing, list your major findings from the discussion and this assignment in a bullet-point list. Collate all your findings in the summary keeping ..

  Program that checks if a certain number is divisible

Write a c++ program that checks if a certain number is divisible

  Exploit be demonstrated safely in-class

Task: You are required to create and deliver a presentation providing an analysis of an existing software exploit (therefore you are not required to craft a new, unknown exploit yourself).

  Both lagrange interpolation and newton''s interpolation

Use both Lagrange interpolation and Newton's interpolation formulae to find the polynomials for the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd