Nt1310 Unit 2 Assignment 1

Great Essays
Question 1 part A
The first thing you should do is state the facts. As a journalist, you should already identify the facts because that is what your story is about. Understanding the facts of the case by stating all the facts and issues going on. The second in the list is our values. You should outline your value and say “What is important to me and what are you willing to give up for this value?” The value affects our final decision because your decision cannot go against your values. The values also help the third step in the potter box, principles. Based on our values, we have to apply the ethical principles we have learned before.
I think value would be the most important because it affects your decision in the long run. It also affects
…show more content…
If your name wasn’t on there then that means you weren’t the author and the company solidified that with them not paying you, but your newspaper did get the money and that is where one your loyalties lie. The public is informed of a place to go to for a better retirement home, they knows it is an advertisement based on the disclaimer on the top. The public just doesn’t know who you are. Newspapers can have and the ad paid for a spot on it. I think them not paying you specifically made it, so they weren’t influencing your writing. The client themselves, have your loyalty so I think that you did them a good service by following through with the interviews and not bad mouthing them in the advertorial. My values were loyalty and the truth. I think that I would let them publish it without my name being on it and without getting paid. SPJ made it more clearly that even with publishing without your name in it is ethical and publishing an ad by a journalist is okay if you inform your readers about what is going …show more content…
You only let in people that you choose and you can give them that information. The moment that goes away is when an ethical issue should arise. It is kind of taking about someone freedom and someone’s right to some sort of privacy. This app can get all of your information by you just click I agree and it gives you both the negative and positive comments instead having that in the first place. You actually don’t have to create the profile someone else can create it for you and all you have to do is hit select and all your privacy is out the window. Peeples is the yelp for your personal life app. You can get rated on as a person and it can lead to bully which leads to so many horrible and psychological problems for some people. You can actually search people on it and you can have their information without them making a

Related Documents

  • Improved Essays

    Sara Ann Thornley 2/3/17 Macronutrients Dr. Huggins Assignment #1 1. A reducing sugar is a sugar that is capable of breaking down certain substances. They have a free ketone or aldehyde group which allows them to become hemiacetale and hemiketals (Gropper, 65).…

    • 528 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    BankID [11] allows users to log in into different merchants by using the same password and two-factor authentication. With this, it helps people to save their bank account. This is used in a web site (merchant) when it needs to securely identify its users. Overall the user need to enter their SSN (Social security number), a password, and at the end a one-time password.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Policy-based management: SQL server has a feature called policy-based management which is used to define and also implement policies in SQL server. It is used if we want to apply any policy against a table or database and then checks whether the database or table satisfies with the given policy. If target database objects are not satisfied with the policies then either a trigger should be fired or we can enforce it so that an administrator will come to know that there is some policy violation. It will manage one or more instances of SQL server.…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    ABC Company has a few diverse equipment and software needs to meet the prerequisites of their network. We've investigated the different pieces of equipment and software to suit the needs of the company. We've looked into what every building will require with respect to what benefit every site gives and decided their needs based on those results. Servers…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Professor Doupé, Thank you for your reply, and for your questions. We are excited to potentially have your guidance in our research, and hope we have provided clear explanations to your questions below: 1. SSL/TLS encryption secures data flowing between client and server. Using SSL during an authentication attempt could provide a secure way for a non malicious server to authenticate with the device, while blocking out sign in attempts from malware. 2.…

    • 682 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Great news! In an effort to increase security, we have decided to add a layer of security with new technology called PhoneFactor. PhoneFactor allows you to authenticate to our network using only your network login credentials and your phone. Please take 5 minutes to configure your PhoneFactor account now. Visit the link and follow the instructions listed below under What do I need to do to begin using PhoneFactor?…

    • 429 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Web server A web server processes requests using HTTP, the most basic network protocol used for information on the World Wide Web. HTML is the most frequent protocol for WWW and it may include images, scripts and style sheets in addition to text content. A user agent (eg. a browser) communicates by requesting a specific set of data using HTTP.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    After choosing scenario number three, I determined there was no conflict of principles or values in regards to me making the right decision. The nurse was in violation of hospital policy and in violation of HIPPA, which requires me to report the situation for patient safety. I would report what I saw to the charge nurse, instead of approaching the senior nurse and possibly having the situation become hostile. The ANA provision that mainly applies to the situation would be provision 3.1, which is the protection of the rights of privacy and confidentiality of the patient. The nurse violated this provision by looking in the chart of the patient in order to learn why the patient sought care.…

    • 191 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Describe the responsibility of the medical office specialist to protect all protected health information (PHI). Here are my thoughts based on all that I have learned in this program over past few months. The medical office specialist (MOS) has a legal responsibility/duty to maintain the security of protected health information (PHI). The sharing of PHI is controlled by the privacy rule contained in HIPAA.…

    • 957 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Nt1310 Unit 1 Assignment 1

    • 1793 Words
    • 8 Pages

    Guided Reading (8:00) (Group 1 & 2) [Introduction] At the beginning of the lesson, only the teacher has a copy of the book. 1. Remind students of behavior expectations: Listen while others are talking Wait your turn to speak Keep your hands and feet to yourselves…

    • 1793 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    1. The media I use the most is television, while print is my least used form of media. This is what I had expected, since I rarely feel the desire to sit down and just read during the school year, I’d rather watch several television episodes. Relaxing on my bed or couch watching TV or Netflix sounds like a more enjoyable evening, instead of sitting at my desk reading boring textbooks for physics. Plus, I traveled home this weekend and all of my recorded shows were ready to be watched, since there is no DVR on the television in my dorm, therefore I had to view them before they’d be deleted.…

    • 519 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    I happened to know the person posting the job online so I called him to change it because I found statement unfair to other potential candidates. He immediately changed the ad and apologies for his mistake. When I see things that triggers my ethical alarm, I would react and do my best to prevent and eliminate it.…

    • 1801 Words
    • 8 Pages
    Superior Essays