a) State TWO (2) differences between ethics and law. (4 marks) b) List TWO (2) key...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
a) State TWO (2) differences between ethics and law. (4 marks) b) List TWO (2) key points on deontological theories of ethics using a relevant example. (6 marks) c) Make an ethical decision for the following scenario based on the above theory. (2 marks) "Some students find a way to obtain system administrator passwords to the school computer network. They learn how to mask the identity of the computers they are logging in from, so no one can trace their actions or figure out who they are. The students use the passwords to poke around the system, including reading and copying some teachers' files and tests. When they finally get caught, they are in big trouble. The students know they have broken the rules, but they claim that they did not delete or change files, look at personal e-mail or student records, or even personally benefit from seeing the tests. Therefore, they feel their punishment should not be too severe. d) Write TWO (2) justifications for the scenario in question (c) according to the Malaysian Cyber law and the Commandment of Ethics. (8 marks) a) State TWO (2) differences between ethics and law. (4 marks) b) List TWO (2) key points on deontological theories of ethics using a relevant example. (6 marks) c) Make an ethical decision for the following scenario based on the above theory. (2 marks) "Some students find a way to obtain system administrator passwords to the school computer network. They learn how to mask the identity of the computers they are logging in from, so no one can trace their actions or figure out who they are. The students use the passwords to poke around the system, including reading and copying some teachers' files and tests. When they finally get caught, they are in big trouble. The students know they have broken the rules, but they claim that they did not delete or change files, look at personal e-mail or student records, or even personally benefit from seeing the tests. Therefore, they feel their punishment should not be too severe. d) Write TWO (2) justifications for the scenario in question (c) according to the Malaysian Cyber law and the Commandment of Ethics. (8 marks)
Expert Answer:
Answer rating: 100% (QA)
The image contains a set of questions related to ethics law and a specific scenario involving the misuse of system administrator passwords by students I will address each question based on the informa... View the full answer
Related Book For
Income Tax Fundamentals 2013
ISBN: 9781285586618
31st Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill
Posted Date:
Students also viewed these programming questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
The Crazy Eddie fraud may appear smaller and gentler than the massive billion-dollar frauds exposed in recent times, such as Bernie Madoffs Ponzi scheme, frauds in the subprime mortgage market, the...
-
Hansel Electronics has the following: If Hansel has 7,000 units on hand at December 31, the cost of ending inventory under the average-cost method is: (a) $84,000. (b) $70,000. (c) $56,000. (d)...
-
Hector is a single taxpayer with adjusted gross income of $122,000. What is the maximum contribution that he can make to a Roth IRA for the current year?
-
Accrued salaries of $4,950 owed to employees for December 30 and 31 are not considered in preparing the financial statements for the year ended December 31. Indicate which items will be erroneously...
-
Continuing with the case of Shiva Industries Ltd., assume that the company adopted WDV in the first year but decided to shift to SLM in the 5th year. Analyse the impact of this change on the...
-
Refer to the information in Problem 18-30. The Red Deer Company is a food-processing company based in Alberta. It operates under the weighted-average method of process costing and has two...
-
List any four applications of KNN. Explain with Example
-
these are physical and virtual component of my project please make it better by showing SIP trunk, gateway, PSTN integration via ITSP, Asterisk server, SIP endpoints, POE switch, IAX2 trunk to...
-
Vinatexs Board of Directors is deciding whether they should invest in which new factory between the two regions below. Project 1) The first new yarn factory will be located in the southwestern...
-
Alex has invested 60% of his wealth into a risky portfolio with a standard deviation of 20%. 40% of his wealth has been invested in treasury bills with an expected return of 3%. What is the standard...
-
Mr X's daughter just turned eight. He plans to save for her college education by making equal annual deposits in an investment account earning 7.5% compounded semi annually. After his daughter turns...
-
a) Draw the bending moment diagram for a uniform t+-20C change in temperature b) Write the explicit continuity equations numerically for support collapses. 0.2 cm I 21 0.2 cm 21 21 5 m 31 4 m -6 m- 4...
-
Charlie has invested $20 000 in an open-end mutual fund. The fund has a front-end load of 2%, and an expense ratio of 1%. If the fund earns a raw return of 14% over the year, how much can the...
-
Suppose that a small company is thinking of putting plants in their lobby for employees to view and enjoy. Since the plants are to be viewed by employees, the plants are non-excludable (it is...
-
Controls can be identified based on their function. The functions are preventive, detective, and corrective. A. True B. False
-
Carl Conch and Mary Duval are married and file a joint return. They live at 1234 Mallory Sq. Apt. 64, Key West, FL 33040. Carl works for the Key Lime Pie Company and Mary is a homemaker after losing...
-
Jerry made the following contributions during 2012: His synagogue (by check).....................................................$680 The Democratic Party (by check)...
-
William sold Section 1245 property for $25,000 in 2012. The property cost $35,000 when it was purchased 5 years ago. The depreciation claimed on the property was $16,000. a. Calculate the adjusted...
-
In Appendix 16A.1, we illustrate the calculation of a standard error for the marginal effect in a probit model of transportation, Example 16.4. In the appendix, the calculation is for the marginal...
-
In Examples 16.2 and 16.4, we presented the linear probability and probit model estimates using an example of transportation choice. The logit model for the same example is \(P(A U T...
-
In Example 16.3, we illustrate the calculation of the likelihood function for the probit model in a small example. a. Calculate the probability that \(y=1\) if \(x=1.5\), given the values of the...
Study smarter with the SolutionInn App