Software piracy, the unauthorized copying of software without payment to the legal owner, is a growing problem worldwide. Suppose that you are offered a chance to copy a friend’s disk containing copyrighted software. What portions of the ACM Code of Ethics would address this situation? According to the code, how should a computer professional respond to such an offer?

What will be an ideal response?


This situation is covered by General Moral Imperative 1.5: Honor property rights including copyrights and patent. Since the software is copyrighted and is someone else's intellectual property, you should not copy it.

Computer Science & Information Technology

You might also like to view...

How does a client notify a server that an ASCII data transfer is requested?

What will be an ideal response?

Computer Science & Information Technology

A ________ specifies the fields from multiple tables table that should be compared to join the tables.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match the following terms to their meanings:

I. biometrics II. firewall III. proxy server IV. password V. username A. code used to access resources B. unique name on a network assigned to an authorized user C. a program that blocks unwanted or unsafe data D. body characteristics are used to access resources E. a function of the gateway that hides IP addresses

Computer Science & Information Technology

On Facebook, videos must be no more than 20 minutes long and no more than 1024 MB in size

Indicate whether the statement is true or false

Computer Science & Information Technology