Computer Science / Ehtics in Information Technolog

45,677 results

Computer Science / Ehtics in Information Technolog

Consider a scenario. Morgan has developed a software tool and given it free of charge to Shelly for review. The tool is fully functional, and Shelly sells it to other people for money. What are the ethical issues involved in this scenario and how should Morgan react to this ...

English

Let's write down what you can do with the computer. 1. I use the computer to chat with netizens in chatrooms. 2. I use the computer to do paper work. 3. I use the computer to make documents with the word processor, Excel. 4. I use the computer to surf the Internet. 5. I use ...

COMPUTER

Write a 200- to 350-word paper that describes the distinctions of data and information and briefly explains the process a computer uses to convert data into information. • Consider the following: Computers use a completely different language than people, yet they communicate...

cis 105

Distinguish between computer data represented by the state of a computer’s electrical switches and the meaningful information that is displayed to the user. Write a 200- to 350-word paper that describes the distinctions of data and information and briefly explains the ...

acct.information system components

can someone correct these for me when you have a chance thanks: a) source documents b) input devices c) information process d) information storage e) output devices I have to assigned them to the following titles that best plays role in the accouting system. My answers are in ...

cis/105

Distinguish the difference between computer data represented by the state of a computer’s electrical switches and the meaningful information that is displayed to the user. Write a 200- to 350-word paper that describes the distinctions of data and information and briefly ...

probability

out of 250 students interviewed at a community college, 90 were taking mathematics but not computer science, 160 were taking mathematics, and 50 were taking neither mathematics nor computer science. Find the probability that a student chosen at random was a. taking just ...

Computer science(Information Retrieval Architectur

a. Describe how the statement that “language is the largest inhibitor to good communications” applies to Information Retrieval Systems. b. Relate this to the challenges in information retrieval that make it difficult to find the information a user is looking for. c. What ...

computers

· Write a 200- to 350-word paper that describes the distinctions of data and information and briefly explains the process a computer uses to convert data into information. o Consider the following: Computers use a completely different language than people, yet they ...

Computers (Anonymous)

Your post has been removed. Once you write up YOUR THOUGHTS, please re-post, and someone here will be happy to comment. ------------------ Distinguish between computer data represented by the state of a computer’s electrical switches and the meaningful information that is ...

computer

distinguish between computer data represented by the start of a computer's electrical switches and the meaningful information that is displayed to the user

Science

Which most resembles a scientific model? A) computer keyboard B) computer hardware C) computer game D) computer mouse

College Computer

Distinguish between computer data represented by the state of a computer's electrical switches and the meaningful information that is displayed to the user?

computer

What does tenure track, part time instructor of computer science does? To be computer science where can you do volunteering?

Health care

Which of the following refers to the presentation of patient information in a useful form and the association of other relevant details with it? Computer data Health information Patient data Health data Consumer information Computer dat? was my gut choice

I.T

What are some similarities between computer science and information technology?

digital literacy

what is an search engine? A-a website that searches specific information on the world wide web. B-a piece of hard ware that allows your computer to search for information. C-an external device that keeps your computer running. d-an piece of software that interprets data

computer

17. Which of the following sources likely has the most reliable information? A. A graduate student's blog that was updated ten months ago B. A company-sponsored website with detailed citations C. A computer science textbook written by an expert in the field in the early 2000s ...

computer science

ineed help with c++. i am using code blocks and i have a problem with the compiler. when I run this code ¡é # include <iostream> using namespace std; int main() { cout<<"Hello World!"<<endl return(0); } this message keep pops up. ¡é "It seems that this ...

CSC 111 Intruduction to Computer Science

What does it imply to pursue a computer science major in the 21st century?

criminal justice 220

how do you define ehtics? How do they differ with attorneys?

computer

distinguish between computer data represented by the state of a computers electrical switches and the meaningful information that is dispalyed to the user

computers

distinguish between computer data represented by the stateof a computer's electrical switches and the meaningful information that is displayed to the users.

computers

o Distinguish between computer data represented by the state of a computer’s electrical switches and the meaningful information that is displayed to the user.

computers

distinguish between computer data represented by the state of a computer's electrical switches and the meaningful information that is displayed to the user?

CIS 105

I need help with the following assignment: o Distinguish between computer data represented by the state of a computer’s electrical switches and the meaningful information that is displayed to the user. I have read the course material 3 times already and I cannot understand ...

science

An area in your state has been flooded due to heavy rains. How might scientists from the three main branches of science interact in their study of the flood, its effects, and how future flooding might be controlled? OK, I will bite: What do you think the three main branches of...

computer science

____________ is an application program included with Windows that allows the contents of the computer, the hierarchy of folders on the computer, and the files and folders in each folder to be viewed.

grammar

Diagram the simple subject, the simple predicate, and the direct object of each sentence. Diagram any indirect object as well. 1. People solve problems every day. People/solve/problems 2. A computer will provide answers. Computer/will/provide 3. Anidea enters your mind. Idea/...

Information literacy lesson 2

Which of the following sources likely has the most reliable information? A. A computer science textbook written by an expert in the field in the early 2000s B. An article in last month's issue of a peer-reviewed trade journal C. A graduate student's blog that was updated ten ...

Ethics in Tech

The Ariane 5 satellite launch vehicle failed because: A. a faulty on-board computer caused the other computers in the network to crash repeatedly. B. a bad sensor fed faulty information into the flight control computer, causing it to fail. C. the rocket's on-board computer ...

computer science

write a program to select the classes that you are taking(Ex. Computer Science) .When the button is clicked, the program should print the names of the computer language studied. If no, check boxes have been selected, the sentence "No language studied should be printed

computer services

I need help to find more information about the computer service bureau Can anyone help me? What do I need to look under? The question I have to answer is "When the computer service bureau destroys or erases records, should the erasure be verified by the bureau to the phyician?"

Law and Ehtics in Medicine

Could someone please explian what is paternalism prevailing over autonomy mean ? thanks:)

computer information

I am tring to find as much information on the digital Divide in the USA?

applied information technology

What is a Pentium 3 computer? when were they first released? Try to find a typical specification for a Pentium 3 computer

Law and Ehtics in Medicine

Please cheeck my answer thanks :) Dr. Smith is sued for malpractice. When called to give testimony at trial, he will be allowed to testify about the patient's care. I think that's True The other choices were... be barred for revealing medical information about the patient's ...

computer science

Which term best describes a collection of student information and grades that might be similarly displayed in both Excel and Access? A) Database B) Table C) Field D) Record

Science/English

Here is my Science presentation, I'm having trouble with the last two sentences. What would you put as the last two sentences? Computer Technology My presentation is about how computers have changed from the past to the present. Then what I think is going to replace the ...

computer information systems

What did you learn from this course that is new and helpful to you? How will you use that information in the future? what useful advice could you provide someone based on what you have learned?

computer science 100

which of the following are used in a traditional mainframe computer environment

Computer Science

I am learning in my computer science class about algorithms. My teacher wrote on the board: n= 1 running time= 1 3 1+1= 2 7 1+2= 3 15 1+3= 4 31 1+4=5 63 1+5= 6 127 7 255 8 511 9 1023 10 How in the world does this happen? It has something to do with log n steps. I don't ...

computer science

Describe computer laguages according to its generation.

Computer Information Systems

Write 200-350 word paper that describes the distinctions of data and information and briefly explains the process a computer uses to convert data into information. I have gotten to a certain point and I am stuck. I am not sure if anyone can help give me a nudge in the write ...

Cyber Safety

How can information shared on the internet affect your future? Information shared on the internet can affect your future by your computer getting hacked, data getting backed up, and fraud, which all relate in with security. By not sharing personal information you can protect ...

Computer Science

Can anyone tell me where one could find help and advice for a talented 8-year-old on computer programming languages please?

science

Which Windows feature allows you to personalize your computer system? A. My Pictures C. Default Programs B. Control Panel D. Computer

computer science

Cyborg data type sizes. You have been given a job as a programmer on a Cyborg supercomputer. In order to accomplish some calculations, you need to know how many bytes the following data types use: char, int, float, and double. You do not have any manuals, so you can’t look ...

Computer science

what are some examples of a computer system in an unsafe state and describe how the process could be complete without causing a deadlock.

Computer science

Assume you have a computer that contains 1GB of memory. It contains four memory slots. Each slot can contain 128 MB, 256 MB, 512MB, 1 GB, or 2GB memory modules. two of the slots contains a 512MB memory module. What memory chip would you buy to increse the memory on the ...

Computer

How much was the first computer? Cost of the first computer? You have to be more specific. The first digital computer? The first electric analog computer? The first "personal" computer (PET)? The first mechanical analog computer? The earliest computers were room-sized machines...

computer science

• Explain, in a 350- to 700-word paper, each of the 12 principles of information security and how each can be applied to real-life situations. Include an explanation of the four types of security policies

statistics

There are 44 mathematics major and 163 computer science majors at the college. How many ways are there to pick 2 representatives, so that one is a mathematics major and the other is a computer science major?

computer science

calculate the steady state probability of source emitting a "0" from "Applied coding and information theory for engineers" page 70, chapter 2, example 2.4.4 pi0=1/9 pi1=pi2=2/9 pi3=4/9 For Pr(0) how are the values for Pr(0/Sn) found, by my observation, Pr(0/S3) should be 0 but...

computer science

what is meant by a computer virus?

computer science

What exactly do computer scientists do?

Law and Ehtics in Med

Please check my answer thanks :) Which of the following is most pertinent in a legal or courtroom context? 1. Confidentiallity 2. Etiquette 3. Pt's expectaion of privacy 4. Privileged communication I picked 4

statistics

What is the probability that a student in a college of 650 students in both a math major and a computer science major ( assuming these events are independent) If there are 72 math majors and 105 computer science majors?

Technology in the classroom

What is the ideal computer arrangement to use when you want to integrate computers directly into the classroom curriculum? A. One computer located in each classroom B. One computer that's shared among several classes C. A central computer lab, with one computer per student D. ...

Law and Ehtics in med

please check my answer thanks :) Privileged communication is pertinent in a legal or court context. True or False I said True

Computer Information Systems

Explain what method of output would be best for each of the following situations and explain why: hand held computer, color photograph, resume, memorandum, statistical report, company annual report. Thanks for any and all help.

Technology

Which of the following describes the operating system? A - It commands and controls all of the hardware and other software applications ** B - It contains the circuitry that processes the information coming into the computer. C - It is one of the physical components of the ...

computer Science

20 You are trying to boot your computer but your computer keeps displaying a message after the POST that says “'invalid specification”. What does the error mean?” a. an attempt to overclock the primary drive has failed. b. The hard drives thrashing from a ...

computer Science

20 You are trying to boot your computer but your computer keeps displaying a message after the POST that says “'invalid specification”. What does the error mean?” a. an attempt to overclock the primary drive has failed. b. The hard drives thrashing from a ...

Computer

Why is it important to use caution before putting any personal information on a computer? (example(s) required) I think everyone knows the general idea to the answer to this question but this is my final exam question...so it has to be thorough. Any specific ideas for an ...

computers

Write a 300- to 400-word paper that describes the distinctions of data and information and briefly explains the process a computer uses to convert data into information.

computer science

How can i create my computer science project which is to draw a game and make a file on your game which you can create?

Math

Shania bought a new computer for 1,550 from computer 'r' us. If the value of the computer depreciates at a rate of 5.35%per year, when will the value of the computer reach 825 ?

math

The computer-science aptitude score, x, and the achievement score, y (measured by a comprehensive final), were measured for 10 students in a beginning computer-science course. The results were as follows. (Give your answers correct to two decimal places.) x 7 10 19 9 20 22 6 ...

statistics

The computer-science aptitude score, x, and the achievement score, y (measured by a comprehensive final), were measured for 10 students in a beginning computer-science course. The results were as follows. (Give your answers correct to two decimal places.) x 7 6 9 11 11 5 14 8 ...

computer programing

I am little lost how to do this here any help to show me? Create a program that uses a menu with options to enter information about monsters (monster type, special ability, weakness), print the monster information, or quit the program. Use data files and FILE pointers to store...

statistics check

The computer-science aptitude score, x, and the achievement score, y (measured by a comprehensive final), were measured for 10 students in a beginning computer-science course. The results were as follows. (Give your answers correct to two decimal places.) x 7 10 19 9 20 22 6 ...

computer business

1.As we move up the organization's hierarchy from clerical workers to executives, how does the type of support provided by information systems change? 2.How important are end users to the management of the organization's information resources?

Technology and Society

A Web site that has a posted privacy policy protects users from A. use of information for marketing. B. release of personal identification. C. release of information on browsing history. D. downloading of computer viruses.

computer Science

18 You started your new job as a PC tech and are at a customer’s house. The computer has failed to boot. The fan is running but the POST fails every time. What is the best thing to do to possibly find quickly? a. Check the electrical outlet the computer is plugged into...

Computer science

Is computer a system?

Computer science

Is computer a system?

computer network

Any experts in communications/information theory can help me on this? Consider a fiber optic communication channel with cross over probability of 10^-2 and a wireless mobile channel with erasure probability of 10^-2. Calculate the mutual information assuming equiprobable ...

computer science

Assume a computer has the capacity to hold up to 4 memory modules, with each module containing 512M bytes. How many total bits are needed in the memory address?

Statistics

I already found part A just need help with B! The computer-science aptitude score, x, and the achievement score, y (measured by a comprehensive final), were measured for 10 students in a beginning computer-science course. The results were as follows. (Give your answers correct...

Computer science(Information Retrieval Architectur

A. Why are inverted files the most typical structure used for search systems? How does n-grams modify the inversion list approach? B. Discuss the similarities and differences between N-gram and PATRICIA TREE approach to indexing.

statistics

Among the 500 first year students of college, 270 students study computer science, 345 students study mathematics, and 175 students study both computer science and mathematics. If one student is selected at random, find the probability that he did not take either of these ...

Education technology

Which of the following is a sign that your computer may have been infected with malicious code? Your computer runs faster than normal The page you open are not distorted Your computer restarts on its own and then runs properly •• Your computer locks up or stops responding ...

computer

How does a computer generated animation work? (Points: 5) The computer creates constant movement in the characters. The computer, along with human workers, moves the characters on the screen. The computer creates a set of continuous movements, one character at a time. The ...

Physics

The information from an internet web host may sometimes reach your computer by traveling as light to a satellite approximately 3.6 x 107 meters above Earth's surface and back again. What is the minimum time, in seconds, that the information takes to reach your computers?

computer

Why do we need information?

finance

Your company will generate $45,000 in cash flow each year for the next nine years from a new information database. The computer system needed to set up the database costs $260,000. Assume you can borrow the money to buy the computer system at 8.25 percent annual interest.

Computer science(Information Retrieval Architectur

Consider the use of entity identification and categorization. a. What problems are they trying to solve – what are they trying to do. b. How do they affect the list of processing tokens in an item? c. How do they affect the Document Vector for the item?

math

A computer technician has been assigned the task of cabling together five computers numbered one through 5. Computer one must be cabled to computer three, and computer two cannot be cabled to computer five. Make a sketch of the distinct ways that the five computers can be ...

computer

what are types of information systems

English

1. I use the computer to make files with Power point. 2. I use the computer to do paper work with the word processor programs such as Hangeul, Power point and Excel. 3. I use the computer to buy things at Auction, an on-line shop. 4. I use the computer to learn English from ...

Math1

You buy a new computer for $2100. The computer is decreases by 5% annually. When will the computer have a value of $600? Y = a(1+r/n)^n(t)

Computer Tech

Name 2 things that a computer virus might do if it gets into your computer.

English Expressions

1. I work in that building across the street. 2. I am a computer programmer/ a computer scientist. 3. I am a banker/ bank clerk / bank employee / teller / 4. I am an information provider. 5. I am a prosecutor. 6. I am a lawyer/attorney. (Are both the same? Which one is popular...

algebra

The price of a new computer is p dollars. The computer is on sale for 20% off. Which expression shows the savings that are being offered on the computer?

Child Psychology

If you take the information-processing view of cognitive development, you would say that a. typing on a computer keyboard is the equivalent of short-term memory b. thinking and data processing are similar, but not actually related. c. storing information to a hard drive is the...

Information Technology (2 Qs)

1) Order the following components in order of their speed starting from the fastest, and ending with the slowest: CD, Random Access Memory (RAM), Tape, Cache. 2) A computer system may have an extremely fast process, and extremely fast memory, yet the performance of the ...

computer

I am interested in computer so i wanted to ask that what is computer engineer? do they repair computers? are they rich? what are they?

Keith

The Information Systems Audit and Control Association surveyed office workers to learn about the anticipated usage of office computers for personal holiday shopping. Assume that the number of hours a worker spends doing holiday shopping on an office computer follows an ...

Statistics

The Information Systems Audit and Control Association surveyed office workers to learn about the anticipated usage of office computers for personal holiday shopping (USA Today, November 11, 2009). Assume that the number of hours a worker spends doing holiday shopping on an ...

Pages

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48
  49. 49
  50. 50
  51. 51
  52. 52
  53. 53
  54. 54
  55. 55
  56. 56
  57. 57
  58. 58
  59. 59
  60. 60
  61. 61
  62. 62
  63. 63
  64. 64
  65. 65
  66. 66
  67. 67
  68. 68
  69. 69
  70. 70
  71. 71
  72. 72
  73. 73
  74. 74
  75. 75
  76. 76
  77. 77
  78. 78
  79. 79
  80. 80
  81. 81
  82. 82
  83. 83
  84. 84
  85. 85
  86. 86
  87. 87
  88. 88
  89. 89
  90. 90
  91. 91
  92. 92
  93. 93
  94. 94
  95. 95
  96. 96
  97. 97
  98. 98
  99. 99
  100. 100