Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
The paper "Computers Ethic in the Workplaces" discusses that the control program of the hard disk will begin by checking if the requested information is in the hard disk’s cache. If it is present then the program will supply the information on the spot…
Download full paperFile format: .doc, available for editing
Extract of sample "Computers Ethic in the Workplaces"
COMPUTERS IN THE WORKPLACE Ethical and legal usage of computers may be unclear for employees. Because of un d boundaries, there are employees who unknowingly break laws as well as violate computer ethics unintentionally. According to the Free Encyclopedia of Commerce, a recent study on Fortune 500 companies revealed that about 97% of employees feel that it should be necessary to establish grounds which make ethical and non-ethical usage of computers clear. Much data from other studies also showed that guidelines that have been printed on paper reduced the risks of breaking ethical norms in the workplace.
There have been many legislative laws passed to punish and/or prevent deviance from computer ethics in the workplace. Such legislations include the Foreign Corrupt Practices act of 1997 and the 1991 Federal Sentencing Guidelines. The Federal Sentencing Guidelines of 1991 states that companies are responsible for their employee’s actions. The Foreign Corrupt Practices act of 1997 was created to recognize questionable actions among corporations.
Guidelines that have been created are amongst the following:
1. All forms of communication devices or otherwise that belong to the company can only be used for the benefit of the company. Only those who are authorized may be able to use the internet but only for official business reasons.
2. Software that is needed to support your job must be analyzed and accepted by a supervisor and installed by the IT department.
3. Use of internet can provide security breaches and other harmful effects to your company’s system. Thus only authorized personal should be able to use the internet.
4. E-mail also applies to this. It can only be used for reasons that involve the company’s intention.
Any viewing of pornography or sending of pornographic messages will be logged and taken against the offender.
Any discrimination found in e-mails will also be logged and can be grounds for termination.
5. Any information stored or sent from company’s devices are property of the company. No information created or stored in the workplace should be considered private. Your computer and information can be confiscated at any time.
I agree with these terms because this equipment is company owned. The company has every right to know what is going on with its employers and how its devices are being used. Secondly, work is work. There is time for one to play games but not during work hours and especially not with work property.
Information and Hard Discs
1. First the information must be located on a disk. The wares that determine which part of the disk to read can be the application, operating system, system BIOS and a specialized driver software for the disk.
2. One or more translations steps are needed make a final request to the drive producing an address expressed in its geometry. The drive’s geometry typically consists of terms such as the cylinder, the head and sector of the drive that is supposed to be read. Through the disk drive interface, a request is sent to the drive giving the specified address and permission to retrieve the sector of interest.
3. The control program of the hard disk will begin by checking if the requested information is in the hard disk’s cache. If it is present then the program will supply the information on the spot.
4. Drives are usually spinning. If the power management has been modified to "spin down" to conserve energy, the drives controller board will allow the spindle motor to “spin up” the drive so it can operate.
5. The controller board would continue reading and translate information .It would also consider the unique characteristics of the drive. The logic program of the hard disk would consider also the number of the cylinder. The cylinder then relays to the disk what track should be used on the disk’s surface. Then, the actuator finally reads/write the head to the right track.
6. As soon as the heads are in the right place, it starts reading the location. It prioritizes the sector that was requested to be read. The disk would rotate until it has the correct sector number. Finally, he heads start reading the contents of the selected sector.
7. The controller board manages how information from the hard disk is stored into a storage area known as buffer. Lastly, the information is sent to the system memory, fulfilling the system’s request.
Utility Program Functions
1. Defragmenting utility – This utility is important for a PC user because it can make the computer work efficiently. There are times when files on a drive becomes fragmented thereby causing the drive head to look in different places just to locate information. This utility is like a filing system where noncontiguous files are reorganized so they can become contiguous files. The main benefit of having this utility file is that it boosts the performance and reliability of the hard drive.
2. Anti-virus utility –
One of the most popular utilities used today due to the presence of security threats to computers. An anti-virus utility is basically a software that protects computers from other threats such as spyware or malware, which can corrupt your system or steal information. Constant updates are needed so the utility can ward off the latest threats. Although this utility can sometimes slow down the operations, especially if it is scanning in the background. There are numerous types of anti-virus utility available offering different levels of protection.
3. Registry cleaner utility –
Another type of software utility that can clean the invalid entries on the database which can’t be done manually. This was designed basically for Windows OS to clear up registry that is not anymore needed within the system. Among the basic functions of registry cleaner utility are: searching invalid entries or repairing broken links within the system.
Part 2
Most dictionaries define a programming language as a coded language mainly used by programmers to write instructions, which can then be translated into a machine then executed by a computer. Presently, there exists thousands of programming languages. Grouping the languages can be done by determining their function or use. The most general classification would be between a compiler language and an interpreted language. A compiled language is a code developed by a programmer who can be converted into machine language through the use of a special software called compiler. Popular example of which is C++. On the other hand, there is an interpreter language which actually shares almost the same structure as the compiler. The main difference is that the interpreter utilizes less time than the compiler and produces a much different code.
Here are the main characteristics of each language:
Compiler characteristics:
Uses more time to analyze program
The machine produces a binary-code.
The computer hardware directly interprets the code.
Fast execution of the program
Interpreter characteristics:
Time spent on processing the program is short.
The code result is an intermediate code.
The code is not interpreted by the machine, but by another program.
Slow execution of the program
Low-level language
There are two generations of low-level language developed so far from which comparisons can be made.
The first generation programming language (also known as 1GL) is actually a machine code. In fact, this is the only language most microprocessors use directly. Nowadays, this language is rarely used because it is too complicated. Instead, high-level programming languages are used because they are more efficient in handling tasks.
The second generation programming language ( 2GL) is an assembly language. The programmer who uses this language must be very familiar with a microprocessor’s architecture. The basic instructions are assembled (hence the term “assembly”) into the machine code directly. Both the machine code and the assembly code are abstracted into another assembly code.
Sources
" Computer Ethics - Computer Ethics In The Workplace - Ethical, Companies, Company, Organizations, Norms, and Employees ." Free Encyclopedia of Ecommerce. N.p., n.d. Web. 4 Mar. 2011. .
Heathfield Susan M.. "Sample Internet and Email Policy."Human Resources - Business Management Development Jobs Consulting Training Policy Human Resources. N.p., n.d. Web. 4 Mar. 2011.
Read
More
Share:
CHECK THESE SAMPLES OF Computers Ethic in the Workplaces
Looking closely at the conceptual foundations of computer ethics, the same online article entitled Computer and Information Ethics stated that computer ethics has been used to refer to “applications by professional philosophers of traditional Western theories like utilitarianism, Kantianism, or virtue ethics, to ethical cases that significantly involve computers and computer networks” (Bynum 1).... Firstly, computers are deemed logically malleable as they can be “manipulated to do any activity that can be characterized in terms of inputs, outputs, and connecting logical operations (Moor 23)”....
computers IN THE WORKPLACE Ethical and legal usage of computers may be unclear for employees.... According to the Free Encyclopedia of Commerce, a recent study on Fortune 500 companies revealed that about 97% of employees feel that it should be necessary to establish grounds which make ethical and non-ethical usage of computers clear....
The late 20th century witnessed dramatic changes in American workplaces driven by globalization and technology.... Employees are able in many workplaces to download unlicensed software and then wrongfully distribute it or unlawfully modify it.... The Employer Response: Using monitoring and surveillance technologies In order to secure and protect their workplaces and computer networks employers are increasingly using monitoring and surveillance technologies (Voronovich and Kai 688)....
Global competition has increased the demand for more technologically advanced individuals in the society.... Computer scientists and It professionals have been greatly demanded.... However, the demand to ethical awareness of these professionals should as well not be put aside.... ... ... ... Yet, the more that these professionals become more in demand in the market, the more that they need to be taught of the different issues concerning their ethical practices, with which one of the major issues would be the thin line that divides what is perceived to be right and wrong with the use of technology....
The use of a web portal as a supplement to traditional management projects has also been found to increase employees' participation in discussion of cases and project concepts and to lead to more thorough and higher quality discussion than in traditional workplaces alone (Bilimoria, pp.... Paperless workplace researchers have also demonstrated that by encouraging an active workplace environment in which employees communicate virtually and asynchronously, the use of a web portal can help develop technological and communications skills that enable employees to increase their productivity and get more comfortable with computers in the workplace" (Meisel & Marx, 2005: 719)....
In modern workplaces, according to Manovich (2001), Anandarajan and Simmers (2003) and Misa (2004), the employees (who are particularly belonging to Net-Generation) have to be controlled in terms of balancing their affinity to the use of internet for fantasy and for normal workplace operations (Hillerbrand & Sandin, 2011).
... The implied high affinity to the computers and the internet becomes a nuisance at workplaces (Hillerbrand & Sandin, 2011).... So control of employees at workplaces remains the absolute way out; otherwise, the use of the internet is in command (Hillerbrand & Sandin, 2011).
...
Formerly, in pre-industrialized organizations, workplaces were in centralized structures set in a hierarchy.... Information technology has transformed departmentalism that was formerly initially characteristic or workplaces.... The number of online works is highly increasing because of online workplaces.... he Influence of computers to Work Environment (Office)
... ince communication is the basis for any development project, computers have enhanced the flow of communication within organizations globally leading to the birth of information technology....
In addition to this, the respondents did not agree to give responses about in-depth experience at workplaces due to privacy aspects of the workplaces.... These questions are based on the use of social media communication tool in workplaces and its benefits and weaknesses.... Most importantly, the respondents have also responded about the monitoring of these applications in workplaces in order to enhance effective organizational communication and workplace environment....
11 Pages(2750 words)Research Proposal
sponsored ads
Save Your Time for More Important Things
Let us write or edit the coursework on your topic
"Computers Ethic in the Workplaces"
with a personal 20% discount.