Monday, December 9, 2019

IT for Professionals samples for Students †Myassignmenthelp.Com

Question: Discuss about the given points..1. Operating System Maintenance2. Biometric Technologies and Privacy3. Developing a Personal Code of Ethics Answer: 1. Operating System Maintenance Basic component of an operating system: An operating system consists of five major components such as Process management, Memory management, Disk and file system, networking and security (Galvin et al., 2013). Resource Allocation Process A computer can run one process at a time, it appears that multiple tasks are running at a time but the processor can process one process. It switches between one process to another in a fraction of second so it seems that the computer is doing multitasking. The time is automatically allocated for a process on the basis of the priority the processor is available to the process. Basic Operating system tools Operating system tools are normally application programs that are embedded in the operating system but additional third party operating system tools can be added separately. These are programs for controlling printers and other output devices and setting up and controlling the operating system. This program can clean up or optimize the disk drives, alter the screen resolution or add programs and hardware to the operating system. 2. Biometric Technologies and Privacy Arguments for using Biometrics technology in stadium and airports Biometrics is not responsible for loosing personal identity, in the recent world the personal details of a person can be fetched from the internet and used for misguiding other peoples. The digital identity of a person can be tracked from the CCTV cameras in departmental stores and in other places also. Biometrics increases the privacy and protects by integrating the biometric data with the identity. Use of biometric technologies in public places to catch criminals The use of biometric authentication has a threat regarding the privacy right. The government can track and monitor individual citizens and the anonymity is loosed and the privacy is compromised. It destroys the relation between the state and the citizens, since biometric can disclose the identity of a person a person having criminal record can get identified. Impact of biometrics technology Sometimes biometric technology is used in public places by government to catch thief or terrorist, some argue on this that it is a violation of privacy right. I think it is the best way to catch the criminals and terrorist. By using this technique the terrorist attacks can be stopped and many lives can be saved. Discussion of support or nonsupport for biometric technologies In my opinion technology can be used both for good as well as bad purpose. More regulations should be implemented for biometric technology by the government. The private sector should not have access to all the biometric information and some legal act should be enforced against the illegal use of biometric information 3. Developing a Personal Code of Ethics Development a personal code of Ethics The most important thing that is included in the personal code of ethics is the personal belief of a man towards himself. To increase the confidence one should spend some to write about and identify him. Importance of personal code of Ethics A personal code of ethics should have the following things included to have a good personal code of ethics (Banks, 2013). Firstly, one should identify himself by writing his reflection. Secondly, personal confidence should be grown up. A list of ethical belief should be written and followed. Sub parts of Personal Code of Ethics The IT professional have access to data of various company that is confidential for that company, personal ethics should be developed since there is a chance of misusing the data. The education of the IT professionals includes technical knowledge, they should teaches some value and ethics which would help them to grow their ethical value towards the society. References Banks, S. (2013). Negotiating personal engagement and professional accountability: Professional wisdom and ethics work.European Journal of Social Work,16(5), 587-604. Byun, S., Byun, S. E. (2013). Exploring perceptions toward biometric technology in service encounters: a comparison of current users and potential adopters.Behaviour Information Technology,32(3), 217-230 Galvin, P. B., Gagne, G., Silberschatz, A. (2013).Operating system concepts. John Wiley Sons, Inc.. Maekawa, M., Shimizu, K., Jia, X., Sinha, P., Park, K. S., Ashihara, H., Utsunomiya, N. (2012). Operating System.Distributed Environments: Software Paradigms and Workstations, 259.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.