What are the key technological trends that heighten ethicalconcerns?

Answers

Answer 1

Answer:

Key technological trends that heighten ethical concerns are as following :-

1. Declining Storage Costs.

2. Data Analysis Techniques.

3. Doubling of computer power.

4. Networking advances and the internet.

Explanation:

Declining Storage costs-It means that data storage capacity has increased over the years and costs is reduced accordingly.Massive data storage systems are cheap and easily available so local retailers also can have the customers details stored in their systems.

Data Analysis Techniques:-Due to advances in data analysis the companies are able to find much detailed personal information of a person.

Doubling of computer power:-Computer power is doubled every 18 months.We are much more dependent upon the systems and are vulnerable to system errors.

Networking advances and the internet:-People are addicted to internet now a days and there are that they can provide their personal information to any phishing website or mails.


Related Questions

Forwarded events can only be recorded when systems ADMINISTRATORS have de-established an event subscription. TRUE or FALSE

Answers

Answer:

True

Explanation:

Forwarded events can only be recorded when systems administrators have de-established an event subscription.

When askingfor a raise, which one among the following is important toremember?

a- Effort is to berewarded

b- Non-cash benefits may beof value if a raise is not feasible

c- The length of employmentis a great bargaining tool in asking for araise

d- Emotional appeals canhelp in getting a positive response to therequest

Answers

Answer:

a-Effort is to be rewarded

Explanation:

When you ask for a raise in an organization,the one of the most important thing is Effort.There is a reason for everything in organization,if you are asking to raise your income organization will ask you on which basis you are asking.If you put extra hours than before or you gain some skill which is useful for the organization,so while asking for raise you should know the effort that you put in because effort is most important factor for a raise.

In formal organizations, Non cash benefits are not there so there is no purpose for asking it.

Employment does not matter for the peer in asking for a raise,sometimes it is used by small organizations but it is informal,the one should focus more on effort rather than the employment.

Emotional appeals may help in informal organization,never in formal organization.It only imprints negative image on peer's mind,if you want to have a raise you should focus on Effort.    

The ____ method takes a String argument and returns its double value.

a.
parseString()

b.
returnDouble()

c.
parseInt()

d.
parseDouble()

Answers

Answer:

d

Explanation:

In java you can use pareDouble(string str) to convert the string into double.

for example if you have string like this.

string str  = [tex]"16.45" ;[/tex]

then you can use

double mydouble = Double.parseDouble(str);

print(mydouble); //it will print out 16.45

but if the string would not be able to be parsed into double then you will get an error.

The ____ in a binary tree is the number of branches on the path from the root to the node.

A.
size of a node

B.
level of a node

C.
depth of a node

Answers

if i remember correctly from class, it’s c. the depth of a node

types ofsecurity(hardware-software-both)??

Answers

Answer:

There are two types of security:

Hardware security: A hardware security is defined as, it is a physical computing device which help in managing the digital path for strong authentication and provides processing the module. It is used to monitor the traffic and used in scanning the system.

Software security: Software security is a type of software which helps in secure a network and computer devices. It manages access control and provides the data protection of the system and defend from other system security risks.  

briefly describe the software quality dilemma in your own words

Answers

Answer:

 software quality dilemma is a situation where there is confusion regarding what should we prioritize : a good quality work or a fast paced work. In software development , many a times there will be deadlines to achieve, in such cases software quality dilemma is bound to occur. A developer would have to choose between writing and optimized and well commented code or just get the job done without proper optimized or reviews. In same lines, many companies have to decide between regular reviews and expert opinions of a product for good software quality or bypass them to meet budgets and deadlines.

In short, a software quality dilemma means a situation of production of software system that has terrible quality which causes low sales.

A software quality dilemma refers to a situation where there is a confusion regarding what should we prioritize whether a good quality work or a fast paced work with little quality,

In conclusion, in a software development, there are usually deadlines to achieve a software creation and this is one of the cause of software quality dilemma.

Read more about quality dilemma

brainly.com/question/13171394

When a function uses a mixture of parameters with and without default arguments,

the parameters with default arguments must be defined _________.

Answers

Answer: after the required parameters.

Explanation:

Default arguments in a function should be defined after the required parameters because the required parameters are necessary but default arguments are not. If mixed parameters are allowed it will be very hard for the compiler to to judge which value matches which argument so there will be syntax error.

What is the computer virus?

Answers

a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

computer virus can be defined as a malicious program that self replicates by copying itself to another program, in other words, the computer virus spreads by itself into order executable code or documents.

write a program that convert binary number to decimal. I mean the input should be binary number and the output decimal number!!.

Answers

Answer:

#include<iostream>

#include<math.h>

using namespace std;

//main function

int main(){

   //initialization

   long b1;

   int d1=0,count_pos=0;

//display the message

   cout<<"Enter the binary number: ";

   cin>>b1;  //store the value

   //loop for take the digit one by one

   while(b1!=0){

       int rem1 = b1%10;

       d1 = d1 + rem1*pow(2,count_pos);

       count_pos++;

       b1 = b1/10;

   }

   //display the output

   cout<<"The decimal number is: "<<d1<<endl;

}

Explanation:

Create the main function and initialize the variables. Then, display the message on the screen by using the instruction cout and then, store the input enter by the user into the variable. Here, the variable declares with type 'long' because of the size of the input.

After that, we take a while loop for splitting the binary number into the digits and then we can do the operation.

Let's understand how you can convert binary to decimal with an example:

let the binary number is 1001:

decimal number is [tex][tex]1*2^{3}+0*2^{2}+0*2^{1}+1*2^{0}=9[/tex][/tex]

we put the same algorithms in the code. split the number into digit and then multiply with n raised to the power of 2 here, n is the position of digit from left to right.

NOTE: Position starts from zero.

and then, add the values. this process continues until the number is not zero.

After that, display the output on the screen.

True / False
The exponent in floating point is stored as a biased value.

Answers

Answer:

True

Explanation:

The bias value present in a floating point number deals with the positiveness and negativeness of the exponent part for a floating point number.  The bias value for a floating point number is 127. It means that 127 is always needed to be added to the exponent part of any floating point number.

In a single precision floating point number, we need 8 bits to store the exponent. Rather than storing it as a signed two's complement number, it is easier to simply add 127 to the exponent (because the lowest value that can be in 8 bit signed is -127) and simply store it as an unsigned number. If the stored value is bigger than the bias then it would mean the value of the exponent is positive otherwise it is negative, but if they are equal then it is 0.

You can initialize more than one variable in a for loop by placing a(n) ____ between the separate statements.

a.
equal sign

b.
comma

c.
period

d.
semicolon

Answers

Answer:

comma

Explanation:

The for loop is used to execute the specific statement again and again until the condition is false.

The syntax:

for(initialization;condition;increment/decrement)

{

  statement;

}

In the initialization, we an initialize more than one variable by using the 'comma' as separator.

similarly for condition and increment/decrement part as well.

for example:

for(int x = 0,y = 0;x<5,y<5;x++,y++)

{

  statement;

}

we can used as many as possible by using comma

We can include following item(s) during configuration itemidentification:

a) User Manuals andDocumentations

b) Source Code

c) Software RequirementSpecifications

d) All of the above

Answers

Answer:

d) All of the above

Explanation:

In configuration management, the Identify configuration items, work products and related components are present.

All the documents which are related to the work,the manuals how that the system works are present in the configuration item identification.The source code that is implement for the functioning of the products.These are implemented at the time of generation of products.Software Requirement Specifications are also specified by SRS it is present in design stage of software development life cycle,it is also a part of configuration item identification.

: Differentiate between serial and parallel data transfer withat least one example of each from computer sciencedomain.

Answers

Answer:

In serial communication transfers one bit of data at a time, while parallel communication transfers many bits of data at the same time. Serial communication transmits the data bits sequentially, while parallel communication transmits data bits simultaneously, allowing greater amounts of data to be transferred.

-Serial communication is the one used to communicate the Arduino with the Computer through the USB cable.

-An example of a parallel port is the printer port. The Parallel Port was only created and used in the printers interface and the computers.

Explanation:

In serial communication, each bit is sent by its own clock flank where conditions are defined after each byte, if it is synchronous or asynchronous. In parallel communication there is only one single clock flank where the information is sent where it is an advantage to use it where there are several input or output data.

I hope it's help you.

Computer Science (IT). My lecture was asking to do the final year project but i still haven't got the title. Does anyone can give me good recommendation of what the project i should do for my final year project?

Answers

Answer:

Hi, of course.

Project ideas:

Household temperature monitoring  Internet of things

Registration of people entering a shopping center during peak hours  with Internet of things

Smart houses with Internet of things

Explanation:

At the moment I am working on projects related to Internet of things and it is a fantastic world in which to enter, try searching  Internet of things fundamentals on yt and you soak up the subject, then you can start looking on the first hello world in arduino with Internet of things.

In this moment I'm working on a gps tracker for a public buses and it's not too hard as it's sound.

I hope it's help you

Choose a final year project that interests you and showcases your skills, such as machine learning, web development, mobile apps, cybersecurity, or IoT. Engage with faculty for guidance and consider past coursework to generate ideas.

Here are some recommended project ideas:

Machine Learning Algorithms: Develop a project that uses machine learning algorithms to solve a real-world problem, such as predicting stock market trends or diagnosing medical conditions based on patient data.Web Development: Create a comprehensive web application, perhaps an e-commerce site or a social networking platform, focusing on both front-end and back-end development.Mobile Application Development: Build a useful mobile app, such as a fitness tracker, budgeting tool, or educational game. Include features that integrate with various APIs for an enhanced user experience.Cybersecurity: Design a system for detecting and preventing cybersecurity threats, which could involve creating a new type of firewall, intrusion detection system, or a secure communication protocol.Internet of Things (IoT): Develop an IoT solution, like a smart home automation system or an environment monitoring network, utilizing sensors and cloud computing for data analysis and real-time monitoring.

When choosing a project, consider what interests you the most and what areas you want to become more proficient in. Engage with faculty members who have expertise in your area of interest for mentorship and guidance. Additionally, reflect on past coursework that you found particularly engaging or challenging, as it might spark project ideas.

In the STL container list, the functionpop_front does which of the following?

a. inserts element at the beginning of the list

b. inserts element at the end of the list

c. returns the first element

d. removes the last element from the list

Answers

Answer: Returns the first element

Explanation:

The functionpop_front always gives us the first element as it removes the first element from the front of the list.

______ are used to store all the data in a database.

A. Forms
B. Tables
C. Fields
D. Queries

Answers

Answer:

C. Fields

Explanation:

Fields are used to store all the data in a database.

Fields are used to store all the data in a database. The correct option is C.

What is a database?

A database is a collection of data that has been organized to make it simple to manage and update. Data records or files containing information, including as sales transactions, customer information, financial data, and product information, are often aggregated and stored in computer databases.

A database field is a collection of identical data values in a table. It is also known as an attribute or a column. Most databases also permit complicated data storage in fields, including images, whole files, and even movie clips. A lot does not necessarily have simple text values just because it supports the same data type.

Therefore, the correct option is C. Fields.


To learn more about the database, refer to the link:

https://brainly.com/question/29412324

#SPJ6

What are the advantage of transistors over vacuum tubes?

Answers

Answer:

Transistors are comparatively cheaper and consume less power as compared to vacuum tubes.

Explanation:

Transistor when compared to vacuum tubes perform much faster processing, are small and lightweight which enables it to integrate them into circuits.

They also show a high amplification factor than vacuum tubes.

HTML uses formatting codes called ____, which specify how the text and visual elements on a Web page will be displayed in a Web browser.
Answer
entities
schema
tags
blocks

Answers

Answer:

tags

Explanation:

HTML tags provide the formatting information for the web page. Web Browsers like internet explorer, firefox, google chrome interpret these tags and render the page accordingly. For example: content enclosed within <i> and </i> will be rendered in italicized format.Similarly content enclosed within <b> and </b> will be rendered in bold.

The syntax for accessing a class (struct) member using the operator -> is ____.

A.
pointerVariableName.classMemberName

B.
pointerVariableName->classMemberName

C.
&pointerVariableName.classMemberName

Answers

Answer: pointerVariableName->classMemberName

Explanation:

Here the pointerVariableName can be used to access a classMemberName. This ca also be written as (*pointerVariableName).classMemberName.

Answer:

B. pointerVariableName->classMemberName

Explanation:

The syntax for accessing a class (struct) member using the operator -> is pointerVariableName->classMemberName.

Database applications are seldom intended for use by a single user.

A.

True

B.

False

Answers

Answer:

false

Explanation:

Why cli and sti instructions are used during hooking aninterrupt?

Answers

Answer: Cli(Clear interrupt flag ) and sti(set interrupt flag) instructions are used for clearing the flag and setting or enabling a flag respectively while hooking an interrupt.

Explanation: During the action of hooking an interrupt,there are certain interruptions while changing of real time interrupt vector and to avoid those interruptions two instructions are used that is cli ans sli. Cli is present for the clearing or disabling the interrupt flag and sti is used for setting or enabling a interrupt flag.

Write a Java program that calculates and prints the monthly pay check for an employee. The net pay is calculated after taking the following deductions:

Federal Income Tax: 15%
State Tax: 3.5%
Social Security Tax: 5.75%
Medicare/Medicaid Tax: 2.75%
Pension Plan: 5%
Health Insurance: $75.00

Answers

Final answer:

A Java program can calculate an employee's net pay by deducting federal, state, Social Security, Medicare/Medicaid taxes, pension plan contributions, and health insurance costs from the gross pay. The net pay is then output as the amount the employee would receive in their paycheck.

Explanation:

To calculate the net pay for an employee after deductions, we need to write a Java program that considers the following deductions: Federal Income Tax at 15%, State Tax at 3.5%, Social Security Tax at 5.75%, Medicare/Medicaid Tax at 2.75%, a pension plan deduction at 5%, and a fixed amount for health insurance at $75.00.

Here is a simple example of how this Java program might look:

public class PaycheckCalculator {
   public static void main(String[] args) {
       double grossPay = 5000; // Example gross pay
       double federalTax = grossPay * 0.15;
       double stateTax = grossPay * 0.035;
       double socialSecurityTax = grossPay * 0.0575;
       double medicareTax = grossPay * 0.0275;
       double pensionPlan = grossPay * 0.05;
       double healthInsurance = 75;

       double netPay = grossPay - (federalTax + stateTax + socialSecurityTax + medicareTax + pensionPlan + healthInsurance);

       System.out.println("Net pay: $" + netPay);
   }
}

This program calculates each of the deductions based on the gross pay, subtracts them from the gross pay, and prints out the resulting net pay.

Define the following variables (in a new file and a new main() function):
• Integer value a and b
• Pointer variable p and q (pointers to integer values)
• Set the value of a to 5 and value of b to 7
• Set p to point to a and q to point to b (in other words assign the address of variables to pointers)

Answers

Answer:

#include<stdio.h>

int main()//driver function

{

int a=5;//initializing variable a

int b=7;//initializing variable b

int *p,*q;//declaring pointers p and q

p=&a;//assigning the address of a to p

q=&b;//assigning the address of b to q

printf("value of a is %d\n",a);

printf("value of b is %d\n",b);

printf("value of pointer p is %d\n",*p);

printf("value of pointer q is %d\n",*q);  

printf("address of a is %d\n",&a);

printf("address of b is %d\n",&b);

return 0;

}

Output

value of a is 5

value of b is 7

value of pointer p is 5

value of pointer q is 7

address of a is -783856608

address of b is -783856604

The expression vecCont.empty() empties the vector container of all elements.

True

False

Answers

Answer:

False

Explanation:

Vector is a similar to dynamic array which has the ability to resize itself automatically.

empty() is a function used in the vector.

It is used to check the vector is empty or not.

it does not delete the element in vector, it just check the vector is empty or not, if vector empty it gives a Boolean value True other wise False.

Therefore, the answer is False.

_________ local variables retain their value between function calls.

Answers

Answer: static

Explanation:

variables when declared static gets called statically meaning whenever a function call is made it get stored and it is not required to get the variable again when the function is again called. There scope is beyond the function block

A jeweler designing a pin has decided to use five stones chosen from diamonds, rubies, and emeralds. In how many ways can the stones be selected?

Answers

Answer:

3,125 different possible ways

Explanation:

Great question, hopefully i can shed some light on the situation. There are a total of 5 stones. One by one they are randomly picked out of the bag. We need to find how many possible combinations there are for picking the stones out of the bag. We can solve this by raising the amount of stones in the bag to its own power like so,

[tex]5^{5} =  3,125[/tex]

So now we can see there are 3,125 different possible ways of selecting the stones.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

Given an array A of n + m elements. It is know that the first n elements in A are sorted and the last m elements in A are unsorted. Suggest an algorithm (only pseudo code) to sort A in O(mlogm +n) worst case running time complexity. Justify.

Answers

Answer:

Explanation:

We can divide array A into two arrays B , C

B would contain the sorted n elements.

C would contain the unsorted m elements.

Now we can sort C using merge sort with worst time complexity mlogm.

When you will have array C sorted you can concatenate with B and put it back in A.

Write a recipe that stores the sum of the numbers 12 and 33 in a variable named sum. Have your recipe display the value stored in sum.

Answers

Answer:

#include<iostream>

using namespace std;

int main(){

   int sum = 12+33;

   cout<<"The sum is: "<<sum<<endl;

}

Explanation:

First include the library iostream in c++ program for input/output.

Then, create the main function and declare the variable sum as integer type and store the sum of two given values.

After that, display the result store in the sum variable on the screen by using the instruction cout.

Given a int variable named callsReceived and another int variable named operatorsOnCall write the necessary code to read values into callsReceived and operatorsOnCall and print out the number of calls received per operator (integer division with truncation will do).

Answers

// c++ code to read the recieved calls

cout<< " Enter the calls recieved :";

cin>>callsRecieved;

cout<< " Enter operator on call : ";

cin>>operatorsOnCall;

// calculating the call per operator

calls_per_operator = callsRecieved/operatorsOnCall;

// printing the vaule.

cout<<" Calls recieved per operator are : " << calls_per_operator <<endl;

Final answer:

To find the number of calls received per operator, read inputs for callsReceived and operatorsOnCall, then divide callsReceived by operatorsOnCall using integer division and print the result.

Explanation:

To calculate the number of calls received per operator, you will first need to read values into the variables callsReceived and operatorsOnCall. You can do this using an input method appropriate for the programming language you're using (e.g., scanf in C, cin in C++, or input() in Python). Once you have these values, you perform the division of callsReceived by operatorsOnCall and print the result. Here is an example code snippet in Python:

# Read the number of calls received and the number of operators on call
callsReceived = int(input('Enter the number of calls received: '))
operatorsOnCall = int(input('Enter the number of operators on call: '))

# Calculate the calls per operator with integer division
callsPerOperator = callsReceived // operatorsOnCall

# Print the result
print('The number of calls received per operator is:', callsPerOperator)

Note that integer division with truncation is used (// in Python) to get an integer result.

1) All the elements of an array in Java MUST conform to the same data type.

a) True
b) False

Answers

Answer:

TRUE

Explanation:

The array is allow to store the multiple values but with same data type.

It cannot store element with different data type.

For example:

int array[] = {1, 'b', 8.7, 9, 'z'}

the above is wrong way to declare the array.

the correct ways is:

int array[] = {1,2,3,4};

float array[] = {1.2, 3.4, 9.6};

we can store only same data type element in multiple tiles.

Other Questions
Plot A shows the number of hours ten girls watched television over a one-week period. Plot B shows the number of hours ten boys watched television over the same period of time.Television Viewing Hours for a One-Week PeriodWhich statement compares the shape of the dot plots?A) There is a gap in both plots.B) There is a gap in Plot A, but not in Plot B.C) The data is spread widely across both plots.D) The data is spread widely across Plot B, but not across Plot A. A point charge is moving with speed 2 107 m/s parallel to the x axis along strait line at y=2 m. At t = 0, the charge is at x = 0 m. The magnitude of the magnetic field at x = 4 m is B0 at the origin. The magnitude of the magnetic field at at origin when t = 0.15 s is? Which nervous system division is responsible for the integration of sensory information? Find the area of the image. 2 PointsWhat makes Wind-Wolf want to leave the school?) A. The other children in the class laugh at him.B. He answers a question wrong and feels embarrassed.OC. He meets his classmate's racist motherD. His teacher forces him to cut his long hair. The length of a rectangle is three times its width. The perimeter is 160 cm. What is the number of square centimeters in the area of the rectangle? What is flow energy? Do fluids at rest possess any flow energy? Angles 4 and 5 form what type of angles?complementary anglessupplementary anglesvertical anglesobtuse angles What is the pH of 0.001 M H,SO4 (strong acid)? After mixing 250 ml 0.001 M H,SO, with 750 mL water, what is the pH now? You can use______ in order to allow the user to browse and find a file at run time.a. the OpenFileDialog common dialog controlb. the StreamReader objectc. the OpenDialog controld. a hard-coded path name When we correctly _____ and _____ our words, it is known as articulation calculate the acceleration of an apple of mass 200gm,when it falls towards earth.also find the acceleration of the earth towards the apple.(given mass of earth=6*10^24 kg& radius of earth= 6.64*10^6m) how to deal with blame What is the benefit of peer review for students who are writing essays Longest serving president elected 4 times was ____ Write a recursive function that returns true if the digits of a positive integer are in increasing order; otherwise, the function returns false. Also, write a program to test your function. Alicia y Pedro salieron a cenar ayer por la noche. Alicia (vestirse) elegantemente (elegantly). Pedro siempre lleva traje para trabajar, pero anoche (preferir) vestirse con ropa informal. A su novia no le import. (Ellos) (ir) al restaurante de Pepe. Cuando (llegar), el camarero les (traer) el men. Alicia y Pedro (pedir) vino para beber y se (comer) una paella con mariscos. El camarero les (servir) las bebidas y la comida rpidamente, todo estuvo (was) riqusimo. Cuando (ellos) (salir) del restaurante, (caminar) por el parque y luego regresaron a sus casas. The Kaiser Medical Foundation claims that the cost to rehabilitate a football player following a head injury is at most $28,500. To test this claim a researcher surveys the medical billing records of 45 football players who were treated for head injuries. The average cost for rehabilitation in this randomly selected sample is $30,885 with a standard deviation of $1,123. Is the actual cost of rehabilitation at most $28,500 as Kaiser claims? Through which duct can pancreatic juice be released into the small intestine without also releasing bile? What is the effective resistance of a cars starter motor when 150 A flows through it as the car battery applies 12.0 V to the motor?