Software piracy, the unauthorized copying of software without payment to the legal owner, is a growing problem worldwide. Suppose that you are offered a chance to copy a friend’s disk containing copyrighted software. What portions of the ACM Code of Ethics would address this situation? According to the code, how should a computer professional respond to such an offer?
What will be an ideal response?
This situation is covered by General Moral Imperative 1.5: Honor property rights including copyrights and patent. Since the software is copyrighted and is someone else's intellectual property, you should not copy it.
You might also like to view...
How does a client notify a server that an ASCII data transfer is requested?
What will be an ideal response?
A ________ specifies the fields from multiple tables table that should be compared to join the tables.
Fill in the blank(s) with the appropriate word(s).
Match the following terms to their meanings:
I. biometrics II. firewall III. proxy server IV. password V. username A. code used to access resources B. unique name on a network assigned to an authorized user C. a program that blocks unwanted or unsafe data D. body characteristics are used to access resources E. a function of the gateway that hides IP addresses
On Facebook, videos must be no more than 20 minutes long and no more than 1024 MB in size
Indicate whether the statement is true or false