____ arguments focus on the duties of the person acting and the way the act impinges on the rights of others.

A. Utilitarian
B. Consequentialist
C. Hacker
D. Deontological


Answer: D

Computer Science & Information Technology

You might also like to view...

What is DHCP snooping?

a. a feature that can be disabled to specify the trusted DHCP source; the switch will block the DHCP server messages from the untrusted sources b. a feature that can be enabled to specify the trusted DNS source; the switch will then block the DHCP server messages from the untrusted sources c. a feature that can be enabled to specify the un-trusted DHCP source; the switch will pass the DHCP server messages to the untrusted sources d. a feature that can be enabled to specify the trusted DHCP source; the switch will block the DHCP server messages from the untrusted sources

Computer Science & Information Technology

What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?

A. availability B. cost C. security D. complexity

Computer Science & Information Technology

The tables of information in a relational database are linked or joined to one another by a ________ field.

a. redundant b. relationship c. common d. data

Computer Science & Information Technology

Linked lists cannot be used to implement an adjacency list.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology