Socrates noted that no man does evil intentionally

Assignment Help Basic Computer Science
Reference no: EM13820746

1.) Socrates noted that no man does evil intentionally. In modern society, hackers and identity thieves have become the scourge of working on the world wide web. How do the actions of cyberthieves fit into Socrates school of thought? What motivates the hackers and thieves, and how do you think these people justify their actions to themselves and their significant others? Do other schools of ethical thought better describe the motivations of hackers? Your post should be at least 200 words, cite your sources with accuracy, 2.) NIST standards provide fairly specific guidance in the design and implementation of computer systems in Federal systems. Given that NIST standards are not required in private enterprise designs that do not interface with Federal systems, would the reference to these standards be useful in private contractual specifications? Why or why not? Your posting should be 200 words or more, cite your sources. 

Reference no: EM13820746

Questions Cloud

Ceo containing the efn calculation : Prepare a 700 to 800 words financial report for the CEO containing the EFN calculation, the ratio calculations, and an explanation of how you reached the calculations. Explain which income statement and balance sheet items you assumed were variabl..
Institutional critique : Institutional Critique
Write about instructions on how to fix the snack you picked : Write one to two pages of instructions on how to fix the snack you picked. Imagine your audience is third grade Girl Scouts who have little or no experience in a kitchen.
Feedback of observations may occur : Feedback of observations may occur _____.
Socrates noted that no man does evil intentionally : 1.) Socrates noted that no man does evil intentionally. In modern society, hackers and identity thieves have become the scourge of working on the world wide web. How do the actions of cyberthieves fit into Socrates school of thought? What motivates t..
Chance to pursue occupational therapy : CHANCE TO PURSUE OCCUPATIONAL THERAPY
Discuss how server virtualization : From the e-Activity, discuss how server virtualization, architecture, and Hyper-V can create advantages and efficiencies for an enterprise, including considerations for how to decide what an enterprise should factor in when calculating Return on Inve..
Question regarding the continuing value-cost of capital : Bo Corp. expects NOPLAT of $2,500,000 in the first year after the forecast period (or the first year of continuing value period.  In addition Bo expects growth of 3% during the continuing value period, return on new invested capital of 10%, and a ..
Windows media right management : "Windows Media Right Management"  Please respond to the following:From the e-Activity, take a position on whether the Windows Media Right Management (DRM) is similar to the Public Key Infrastructure (PKI) as read in Lesson 6.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Define or describe the database

1. Mention a database that you think is important or stood out to you. 2. Define or describe the database. 3. Discuss why the database is important or stood out to you. Cite personal experience with the topic if appropriate.

  Design a class named rectangle to represent a rectangle

Design a class named Rectangle to represent a rectangle. The class contains: ? Two double data fields named width and height that specify the width and height of the rectangle.

  Security threat report

Determine whether or not you believe that the mobile device threats are the most critical and disturbing of all of the security threats presented in the articles. Provide a rationale for your response.

  How write program contains array double values

How do you write a program that contains an array of 15 double values

  What are the five different approaches to risk

What are the five different approaches to risk? What are the pros and cons of each strategy? Support your answer with solid reasoning class is cmgt 400

  Our model assumes that the arrival distribution of customers

In the McBurgers simulation, our model assumes that the arrival distribution of customers is the same throughout the entire day. Do you think this is a realistic assumption? If not, explain how you could modify the model to make it a better repres..

  Future applications will change manufacturing industry

Prepare a response which explains the future applications which will change manufacturing industry, judiciary, and field of sports. Explain at least one application for each field.

  Design a case structure that tests the month variable

Design a case structure that tests the month variable and does the following

  Determine smallest value of x for which is safe state

System has 4 processes and 5 allocatable resources. The current allocation and maximum needs are as follows: Determine the smallest value of x for which this safe state.

  Values for the items in the risk register

Recommend reasonable values for items in risk register for this asset and threat, and give justifications for your choices.

  Identify a recent moral dilemma or ethically questionable

Identify a recent moral dilemma or ethically questionable situation relating to ICT - use the Doing Ethics Technique (DET), ensuring you address each of the DET questions;

  How to create system restorepoint in task scheduling

how to create a system restorepoint in task scheduling using the GUI in Windows 7 and task scheduling using the AT command in Windows 7.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd