100%(44)44 out of 44 people found this document helpful
This preview shows page 1 - 4 out of 10 pages.
1Gilbert is an independent consultant who helps organizations select the right accounting software for their needs. After evaluating a local nonprofit organization, Gilbert recommended an accounting software package that he believes meets specifications, secures documents, and satisfies user requirements.Gilbert did not tell his client that he owns a 25% share in the business that developed the software, and that he will benefit if the organization decides topurchase the software he recommends.Which principle of the Software Engineering Code of Ethics has Gilbert violated?Principle 4: Judgment Principle 2: Client and EmployerPrinciple 3: ProductPrinciple 1: PublicRATIONALEGilbert has violated the "judgment" principle established by the Software Engineering Code of Ethics. This principle states that software engineers must maintain integrity and independence in their professional judgment. This includes disclosing conflicts of interest.GIlbert's selection of this product involves an obvious conflict of interest. He should have informed his client about his ties to the software development company.CONCEPTProfessional Code of Ethics2Select the sign of computer addiction that indicates neglect.
When confronted by her employer about the amount of time she spent checking her social media account at work, Heidi claimed that she only checks it during her breaks, and at lunch.While waiting in the light-rail station, David became so absorbed in an online political post that he missed his train and was late for work.When confronted by his parents about the excessive amount of time he spent playing video games, Tom claims that he plays for only an hour every day.Fearing she would lose her place in the standings of an online game, Rachel declined to attend her cousin's wedding.RATIONALERachel declined to attend her cousin's wedding in order to keep playing an online game. This is clear evidence of neglect.CONCEPTComputer Addiction3__________ is a mobile application used primarily to share photos and videos with others.InstagramQQTwitterLinkedInRATIONALEInstagram is a mobile photo sharing application, which enables users to share photos and videos with "followers."CONCEPTBenefits and Risks of Social Media
4The standard interface technology for wireless networks is __________. The hardware component necessary for computers to connect to these networks is a __________.wireless fidelity; WAPwireless-defined networking; WAPtransmission control protocol; IPwireless-internet protocol; TCPRATIONALEWireless fidelity (Wi-Fi) is the standard interface technology for wireless networks. WAP (Wireless Access Point) is a network hardware component that enables computers on a network to connect wirelessly.