Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

As your lecture points out, there are many different ethical arguments, but two large groups of thought are deontological (largely associated with the work of Immanuel Kant) and telelogical ethics (largely associated with John Stuart Mill). The first believes that we should judge our ethics based on the idea of universal understandings. For example, it is logical that all persons do not wish to be harmed, so ethically we can establish a principle based on this. So, under this line of thought, if it is ethically wrong to harm a person, then the death penalty must be ethically wrong, because it violates this principle. If you follow this ethical approach, all ethical questions must be evaluated in accordance to these universal principles. In contrast, telelogical ethics, which utilizes utilitarian thought, looks to the outcome of the action and weighs if it is good based on its impact on the majority. For example, in considering the idea of the death penalty again, one must weigh whether utilizing the death penalty benefits the majority of the population. If the majority is helped, then the action is viewed as ethically sound; if the majority is hurt, it is not. In understanding these thoughts and approaches, what do you think about cloning? Is there a universal thought it may violate? Or can it be considered as good for a majority? What are your thoughts, and what are the different questions that can be raised behind them?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92196578
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Question a swimmer is an athlete any athlete who

Question : A swimmer is an athlete. Any athlete, who participatedin the 2016 Summer Olympics and won a gold medal, was joyful. Any athlete, who is the world top athlete or a selected well-trained athlete, participatedin ...

Now assume that this market becomes perfectly competitive

Now, assume that this market becomes perfectly competitive. The production process for the good does not change. So, all firms have the same cost curves as the monopolist. Reference from: Q3. A monopolist in the sugar ma ...

Sorting program note make sure you use c programming

Sorting Program Note: Make sure you use c++ programming otherwise i will not grade your work For this assignment, you are to write a comparative algorithm that will compare the efficiency of three sorting routines. Here ...

Assignment week 5 bugs vs feature requeststhere is no such

Assignment: Week 5 Bugs vs. Feature Requests There is no such thing as a bug-free IT project. Because bugs are a fact of IT project life, IT project managers must articulate a process for identifying, tracking, and handl ...

Task 1implement a queue on a char array do not use queue

Task 1 Implement a Queue on a char [] array. Do not use ::Queue:: class from the STD library for this example. The user will input a string and the program will return the string with each letter in the string duplicated ...

What are the minimum numbers of keys and pointers in btree

What are the minimum numbers of keys and pointers in Btree (i) interior nodes and (ii) leaves, when: a) n = 10; i.e., a block holds 10 keys and 11 pointeis. b) n = 11; i.e., a block holds 11 keys and 12 pointers.

Suppose there is exactly one packet switch between a

Suppose there is exactly one packet switch between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and receiving host are R1 and R2 respectively. ...

Explain why a successful information security program is

Explain why a successful information security program is the shared responsibility of an organizations three communities of interest.

A different ethanol processing facility costs 800000 to

A different ethanol processing facility costs $800,000 to construct but will instead last forever. Every year (starting the year after  construction), it produces 10,000 barrels of ethanol and can charge a price of $4 pe ...

Explain that when an unauthorized individual gains access

Explain that when an unauthorized individual gains access to the information an organization trying to protect, that act is categorized as a deliberate act of espionage or trespass.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As