Explanation:
Ethical behavior is based on written and unwritten codes of principles and values held in society. Ethics reflect beliefs about what is right, what is wrong, what is just, what is unjust, what is good, and what is bad in terms of human behavior.
Answer:
most people go by the crowd to the way they act. theres are also people who have to make very hard decisions and not everyone makes the right choice.
Explanation:
test unit 8 edhesive answers
put true or false..
1. Static web pages cannot be edited or visitor makes any handle with them. ( )
2. Name attribute used for display a text on the button. ( )
3.submit button used to clear input fields from any previous data ( )
4.HTML language isn't enough to make a confirmation to the data entry ( )
1.) False
2.) False
3.) False
4.) False
You are taking a college class. The textbook costs over $150, but you find a PDF of it online for free. If you download the PDF, you are almost certainly guilty of:
breach of contract.
patent violations.
copyright infringement.
data integrity violations.
Answer:
Copyright infringement.
Answer:
copyright infringement
Explanation:
Which of the following is a programming language that translates code one line at a time? (5 points)
a
C:
b
Java
с
Machine
d
Python
Answer:
Python!
Its the only programming language that is an interpreted language
Hope it helped <3
Corinne would like to click on the link at the bottom of a Web page but she only sees the top portion of the page. She should _____. A.click twice on the status bar
B.use the scroll bar to scroll down to the bottom of the page
C.click on the back button
D.click on the display window and drag it up
Answer:
B
Explanation:
from 3dg3
Answer:
D.click on the display window and drag it up
What is Polymorphism in programming? Explain in your own words with examples.
Answer:
A computer program which can change on it's own, such as a polymorphic virus that is harder to detect. It can change it's own code to achieve the same goal but have a different structure.
Explanation:
Answer:
Polymorphism is a feature of object-oriented
programming languages that allows a specific routine to use variables of different types at different times. Polymorphism is the ability of a programming language to present the same interface for several different underlying data types.
Explanation:
hope it helps
A radio and communications security repairer is responsible for both radio and satellite communication systems.
True
False
Answer:
The answer is true
Explanation:
I got it correct on the quiz
A computer is set up to copy DVDs overnight and have them ready the next morning when employees come into work. This would be an example of _____.
buffering
link-loading
multitasking
batch processing
Answer:
batch procressing
Explanation:
This is when something is scheduled to be done.
In this example, the computer is scheduled to copy DVD's and have them ready the next morning.
write any two reasons why files are stored in folders
Answer:
Explanation:
The answer is The tree structure suggests the main benefit of folders: to organize your files. You can create folders to store and organize your pictures, your documents, your videos, and so on. Folders are also used to separate the files created by different users.
Answer:
Putting files into folders can help you stay organized and keep your files seperated. Having seperate place for different files make them easy to find. Having folders for your files also make them easier to move, for example, if you are moving your information to a new device, it is faster and more efficient because your files are placed in folders, so you don't have to move each indviual file.
I hope this was helpful! =)Harrison works in a manufacturing unit and oversees the logistics, including the daily shipping of a large number of packages. Which information system will he use in the unit to keep track of the deliveries?
Answer:
E. Transaction processing system
Explanation:
Explanation: He will need a transaction processing system to know the amount of logistics available daily and how many to ship and how many to order. Transaction processing system will make him keep track of what transactions take place during the various days to help him give a good report.
About C header files of C programming
Answer:
A header file is a file with an extension. Which contains C function declarations and macro definitions to be shared between several source files. There are two types of header files: the files that the programmer writes and the files that come with your compiler.
What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
The most common thing to share in Outlook is the calendar.
The Publish Online option is for users outside an organization.
Changing calendar permissions only changes what a user can see.
Publishing a calendar online will allow anyone in the world to see it.
The Share option opens an email message that sends the calendar link.
O Calendar sharing options include Email, Share, Publish Online, and Delegate.
Answer:
The characteristics of calendar sharing options in Outlook 2016 are;
1) The most common thing to share in Outlook is the calendar
2) The Publish Online option is for users outside an organization
4) Publishing a calendar online will allow anyone in the world to see it
5) The Share option opens an email message that sends the calendar link
6) Calendar sharing options include Email, Share, Publish Online, Delegate
Explanation:
1) Sharing is used mostly by a group of people working on a given project
Items commonly shared in Microsoft Outlook includes email Folders calendars and address books (contacts)
Therefore, for people working on a project together, the most common thing to share in Microsoft Outlook 2016 is the calendar
2) The Publish Online option allows a user to make a calendar available to people outside the organization
3) The calendar sharing permissions are;
a) Who can view the date and time marked as busy
b) Who can view the location and titles of appointments
c) Who can view all the calendar details
d) Who can edit
e) Who can delegate
Therefore, changes in calendar permissions does not only change what the user can see
4) When publishing a calendar, a special URL is created that can be shared to people outside of an organization
A published calendar can be viewed by everyone that has the calendar link
Therefore, publishing a calendar online will allow anyone in the world to see it
5) When a calendar is shared, the person with which the calendar is shared will receive an invitation email for the invitee to accept with an "Open this Calendar" button
Therefore, the Share option opens an email message that sends the calendar link
6) Calendar sharing options includes
a) Sharing the calendar within the organization
b) Publishing a calendar to the web to share the calendar
c) A calendar can be shared in an email
d) Authority can be delegated to a particular calendar
Therefore, calendar sharing options include Email, Share, Publish Online, Delegate
1, 2, 3, 5
just did it
Which language paradigm interacts well with database systems in business environments that use SQL?
A) logic-based
B) fourth-generation
C) data-oriented
D) aspect-oriented
High-level programming languages are (5 points)
O a
closer to human languages
Ob
less time consuming to run
ос
much more in control over the hardware
Od
similar to native machine code
When comparison shopping, all of these hint at a good deal EXCEPT_____________________.
Answer:
lower-priced models offer more features
Explanation:
Hardware refers to programs and protocols used on a computer system.
True
False
Answer:
False
Explanation:
Answer:
false
Explanation:
i JUST took the quiz
ANSWER ALL QUESTIONS CORRECTLY PLEASE AND YOU WILL GET A BRAINLIEST AND 10+ POINTS!!!! I WOULD REALLY APPRECIATE IT
Through the use of ICT and emerging technology in todays world, a number of sectors have been affected (whether in a positive or negative way). Three sectors in which ICT has had an impact are the health care, education, and banking sector.
Define the term ICT?
List three ICT tools that are commonly used in the education system?
Identify two ways in which ICT has impacted the education sector?
Answer: uhm can u explain what ICT is so i can understand the questions pls when i whould gladly help :)
Explanation:
A style sheet consists of CSS ______________________ that specify the layout and format properties to apply to an element. *
so the word your looking for is Properties so it would be
A style sheet consists of CSS Properties that specify the layout and format properties to apply to an element. *
scav
What is the difference between electrical and electronic devices?
Answer:
A difference is that the electrical devices makes the electrical energy into the other forms of energies, such as heat, light, sound, gravitational, and nuclear. . . The electronic device controls the flow of electrons for performing the task.
Answer:
the different between electrical and electronics devices is the electricity and the power of inside of some devices which are considered most powerful electronics from, because the difference is the battery.
Explanation:
i hope it helps ;)
PLEASE ANSWER ALL QUESTIONS CORRECTLY FOR 50 POINTS AND A BRAINLIEST!!!! IT ALSO INCLUDES ENGLISH, PLEASE KEEP IN MIND THIS IS ALSO IMPORTANT JUST AS THE OTHERS (NO SPAMMING OR LINKS)
Which stage of the problem-solving process involves identifying the inputs, process, and output for each solution? *
Definition of the problem
Develop the algorithm
Propose and evaluate possible solutions
Determine the most efficient solution.
Software used for professional print publications such as posters, books, and email newsletters is called a: *
Professional software
Word processing software
Desktop program
Desktop publishing software
Which of the following criteria does NOT determine the credibility of a source? *
How current the information is
The reputation the publisher
The article covers (speaks about) the topic being researched
The gender of the author
The process of finding a solution to a difficult or complex issue to make it easier is known as *
problem
problem-solving
input
A series of actions taken in order to solve a particular problem is known as the____________ *
process
problem
input
output
A finite set of unambiguous (no uncertainty, clear) instructions that can be performed in a prescribed sequence to achieve a certain goal is called a/an *
problem
output
algorithm
input
Which is the third step in the problem-solving process? *
Propose possible solutions
Test and evaluate the solution
Select the most effective solution
Defining the problem
A list of sources you used when writing a scholarly article on a specific subject is known as a: *
intellectual-property
credibility
bibliography
trademark
Which of the following are you able to create with the use of desktop publishing software? *
1 point
E-Book
Banner
All of the above
Newsletter
Which of the following is NOT a writing style format for academic purposes? *
Times New Roman
American Psychological Association
Modern Language Association
The right by an individual to protect his/her literary work such as poems, songs, and drawing is known as *
plagiarism
copyright
industrial property
trademark
Through the use of technology we can easily: *
SELECT ALL THAT APPLY. HINT: ONLY TWO OF THE 4 ARE CORRECT.
say more traditional jobs being available
agree that there are fewer emerging jobs
sell goods and services as we’ve never been able to
produce more jobs which will create growth and development in the country.
Answer: 1 Definition of the problem
2 Desktop publishing software
3 The gender of the author
4 problem-solving
5 input
6 algorithm
7 Select the most effective solution
8 credibility
9 All of the above
10 American Psychological Association
11 copyright
12 agree that there are fewer emerging jobs
sell goods and services as we’ve never been able to
Explanation:
What is an "Expert System"?
If you can’t answer pls leave It
Answer:
program that use artifical intelligents
Explanation:
Expert system, a computer program that uses artificial-intelligence methods to solve problems within a specialized domain that ordinarily requires human expertise.
Multitasking systems _____.
are easier to develop than single programming systems
execute each job faster
execute more jobs at the same time
are used only in large mainframe computers
Answer: Multitasking systems are able to execute multiple jobs at the same time, hence the name "multitasking systems".
You read an article about someone who leaves USB sticks in college libraries so that people will pick them up, insert them into their laptops, and download malware. This is an example of:
phishing.
eavesdropping.
wiretapping.
social engineering.
Answer:
social engineering
Explanation:
The above scenario of USB use is an example of social engineering.
What is Social Engineering?This is known to be when a person gets phishing email via any method known as social engineering.
Conclusively, Social Engineering is a term that connote non-technical intrusion that depends on human linkage and it I one where a person is been tricked into breaking normal security means. It often makes use of USB drive for its purpose.
Learn more about social engineering from
https://brainly.com/question/26072214
You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run in Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application
Answer:
The options for running a Windows 7 application on Windows 10 are;
1) Run the compatibility troubleshooter
2) Reinstall the app
Explanation:
The most recent version of Windows 10 supports the majority of applications made for versions of Windows before Windows 10, however, in the event that an application does not run on Windows 10 the options available for running the application are;
1) Run the compatibility troubleshooter as follows;
a) Type the application's name in the tax bar search box
b) In the menu showing the application that comes up, right click on the application's name and select the "Open file location option" from among the options menu
c) In the file location, locate and right click the program file which is the .EXE file and select "Properties" from the options menu. In the Properties dialogue box, select the "Compatibility mode"
d) In the "Compatibility mode" tab, select "Run compatibility troubleshooter"
2) Reinstall the app
a) With the app not yet installed on Windows, in the setup files location of the application, right-click the setup .MSI or .EXE application file
b) In the options menu select "Properties" and then the "Compatibility" tab in the "Properties" dialog box
c) On the Compatibility tab select the "Run this program in compatibility mode for" checkbox and select Windows 7 as your desired Windows
d) Click Ok.
Use the drop-down menus to match each description with the part of a report where it is located.
named moons in the solar system:
page number printed at the bottom of page 1:
page number printed at the bottom of page 20:
group of data titled “Hawks” in a report on species of migrating birds:
report titled “Technology in the Workplace”:
calculation printed beneath a group of data:
date of a report printed at the top of pages 2–100:
Answer:
1) Detail
2) Report footer
3) Page footer
4) Group Header
5) Report header
6) Group footer
7) Page header
Explanation:
I just did the assignment
top secret mission lolz
Answer:
whats the mission about??
Explanation:
~evita
9.5 Code Practice edhesive
Answer:
a = [[34,38,50,44,39],
[42,36,40,43,44],
[24,31,46,40,45],
[43,47,35,31,26],
[37,28,20,36,50]]
sum=0
for r in range(len(a)):
for c in range(len(a[r])):
sum = sum + a[r][c]
print("Sum of all values: " + str(sum) + "\n\n")
print("Average of all values: " + str(sum / (len(a) * len(a))))
Explanation:
I got 100%.
Answer:
a = [[34,38,50,44,39],
[42,36,40,43,44],
[24,31,46,40,45],
[43,47,35,31,26],
[37,28,20,36,50]]
sum=0
for r in range(len(a)):
for c in range(len(a[r])):
sum = sum + a[r][c]
print("Sum of all values: " + str(sum) + "\n\n")
print("Average of all values: " + str(sum / (len(a) * len(a))))
Explanation:
Sum of all values: 949
Average of all values: 37.96
Mecanismo que permite conocer si la persona que esta ingresando a un sistema es realmente quien deba y no un intruso
Answer:
Sistemas de autenticación y seguridad de la información.
Explicación:
La seguridad de la información es un mecanismo que permite saber si la persona que está ingresando a un sistema es realmente quien debería y no un intruso. La seguridad de la información básicamente ayuda a prevenir el acceso no autorizado y permite que la única persona autorizada ingrese al sistema. Los sistemas de autenticación son el mecanismo de seguridad que se utiliza para proteger los datos y los sistemas. Estos sistemas de autenticación también ayudan a garantizar que los usuarios sean la persona autorizada o no.
Who is Carl Thompson?
Complete the sentence with the correct response.
If you were to create a mobile app and wanted to create it on an operating system that would allow the users to personalize preferences within the operating system, you would use the operating system.
Answer:
You would use the Android operating system.
Explanation:
Android is a mobile operating system based on a modified version of the Linux kernel and other open source software, designed primarily for touchscreen mobile devices such as smartphones and tablets. Many application developers prefer it due to its many customization options.