subject

Analyze the given scenario for potential ethical concerns. Susan has just begun a new job. The office's computers are automatically set to inform employees when the computer anti-virus software is due to be updated. This web-security technology is vital to keeping business documents safe. However, Susan does not pay attention to the alerts that pop up on her computer, which results in the anti-virus software expiring.

Susan regularly gets distracted from her assignments and begins perusing websites for personal interests rather than for her assignment. Unfortunately, one day a computer virus infects her computer from one of these websites; she quickly begins to notice problems. When she realizes what has happened, Susan is worried and uncertain. She waits until the end of the day to inform her manager of this incident. Because of her negligence, it's possible that this virus infect her company's confidential data. In her company's workplace rules and regulations, she was told explicitly to stay away from questionable websites due to the sensitive nature of the information on her computer.
1. In this scenario, what is the importance of anti-virus software and other similar virus protection programs? (2 points)

to protect my computer form hacking and save my files

2. What steps could Susan have taken to help prevent this incident from occurring? (2 points)

3. Besides the importance of network security, what other ethical issue does this scenario illustrate? (2 points)

4. What data privacy or legal issues could result from employees' use of the Internet on their company's server? (2 points)

5. Besides avoiding unfamiliar websites, what other measures can be taken to ensure a virus doesn't infect your company's computer network? (2 points)

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 15:30
Some of the items below indicate the steps required to move a slide to a different location in a presentation. select those steps and indicate the order in which they should be performed to move the slide. (for example, if an item describes what you do first, select 1.) included in the list are items that are not part of the process. for these items, select n/a, an abbreviation for not applicable. 1 β€” first 2 β€” second 3 β€” third 4 β€” fourth 5 β€” fifth 6 β€” sixth n/a β€” not applicable drag the slide to the desired place. enter the slide position desired. hold the mouse button down. select move from the tools menu. select the slide. switch to the notes view.
Answers: 3
question
Computers and Technology, 22.06.2019 16:20
It policy compliance and emerging technologies respond to the following: propose at least three control measures that organizations need to put in place to ensure that they remain complaint with emerging technologies and in a continually changing it environment. examine the correlation of effective configuration management and change control procedures to remain compliant with emerging technologies and it security changes.
Answers: 2
question
Computers and Technology, 23.06.2019 02:00
Read this excerpt from helen keller’s autobiography, the story of my life. have you ever been at sea in a dense fog, when it seemed as if a tangible white darkness shut you in, and the great ship, tense and anxious, groped her way toward the shore with plummet and sounding-line, and you waited with beating heart for something to happen? i was like that ship before my education began, only i was without compass or sounding-line, and had no way of knowing how near the harbour was. "light! give me light! " was the wordless cry of my soul, and the light of love shone on me in that very hour. . the morning after my teacher came she led me into her room and gave me a doll. the little blind children at the perkins institution had sent it and laura bridgman had dressed it; but i did not know this until afterward. when i had played with it a little while, miss sullivan slowly spelled into my hand the word "d-o-l-l." i was at once interested in this finger play and tried to imitate it. when i finally succeeded in making the letters correctly i was flushed with childish pleasure and pride. running downstairs to my mother i held up my hand and made the letters for doll. i did not know that i was spelling a word or even that words existed; i was simply making my fingers go in monkey-like imitation. in the days that followed i learned to spell in this uncomprehending way a great many words, among them pin, hat, cup and a few verbs like sit, stand and walk. based on this excerpt, which words best describe helen keller?
Answers: 2
question
Computers and Technology, 23.06.2019 09:00
Design a class tictactoe that: holds the following information about the game: two-dimensional array (3 by 3), and winner. add additional variables as needed. includes the functions to perform the various operations on objects. for example, function to print the board, getting the move, checking if move is valid, determining if there is a winner after each move. add additional operations as needed. includes constructor(s). write the functions of the class, and write a program that uses the class. the program should declare an object of type tictactoe. the program will create the board and store it in the array. the program will allow two players to play the tic-tac-toe game. after every valid move update the array, check if there is a winner. if there is no winner and no tie, then print the board again to continue.
Answers: 2
You know the right answer?
Analyze the given scenario for potential ethical concerns. Susan has just begun a new job. The offi...
Questions
question
Social Studies, 04.08.2019 03:00
Questions on the website: 13722360