1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elina [12.6K]
2 years ago
7

To behave ethically means

Computers and Technology
1 answer:
Vesna [10]2 years ago
3 0

Answer:

1) You do what is right

2)You behave morally

3)You stick to the law

You might be interested in
True or false, USBs are slower than RAM.
Zina [86]

Answer:

False

Explanation:

6 0
3 years ago
What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?
Deffense [45]
<span>The purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command is that </span>It allows many inside hosts to share one or a few inside global addresses. 
8 0
3 years ago
Determine the efficiency and big-O notation for the following algorithm:
Anon25 [30]

Answer and Explanation:

To calculate Big O, go through each line of code and determine O(!), O(n) and return your calculation.

For example,

In O (5 +6n), where 6 5 represent five instances of O(1), and 6 represent the 6 O(n).

We compute the time complexity of the algorithm. We get the result, just an estimation. In given algorithms, run time in milliseconds has been provided, such as in T (1) algorithm process in 512 milliseconds and T(2) algorithms process 8129 milliseconds. But big O notation not measured in milliseconds. Information given is not enough to calculate the big O notation.

       

8 0
3 years ago
when web services are offered outside the firewall, traffic is prevented from reaching the internal networks via the implementat
Tju [1.3M]

An isolated networking space or sub-network that is isolated from the rest of the organization's connected footprint using logical or physical blocks to enable access to untrusted connections in a safe environment is referred to as a demilitarized zone (DMZ).

Demilitarized zones are secluded network areas that provide as a secure link between proprietary and non-proprietary networks within an organization's perimeter. It stops unauthorized traffic from entering the internal local area network of a business. A demilitarized zone (DMZ) is a region where warring parties have agreed to put their differences aside in order to create peace. An example of a DMZ is the little sliver of territory that divides North and South Korea on the Korean Peninsula.

Learn more about demilitarized here-

brainly.com/question/7933837

#SPJ4

3 0
1 year ago
Which programming language uses mnemonic code to represent data, instructions, and memory locations?
Mars2501 [29]

Answer:

B. Assembly Language

Explanation:

Assembly language is the first language that used English like words for representing data, instruction and memory locations. The English-like words are called Mnemonics.

Assembly language uses translator to translate the code into machine language. The translator is called assembler.

The mnemonics examples are:

ADD

SUB

DIV

MUL ..

4 0
3 years ago
Read 2 more answers
Other questions:
  • What is the lowest layer of the osi model at which wired and wireless transmissions share the same protocols?
    11·1 answer
  • legacy application that has hard-coded static IP addresses and is running on an EC2 instance, what is the best failover solution
    11·1 answer
  • When paying bills online, a payee is:
    9·1 answer
  • The hardware that takes the input data and works with it
    7·1 answer
  • A user has connected a USB 3.0 device to a computer using a 3 ft (1m) USB 3.0 cable. However, instead of an expected data transf
    9·1 answer
  • Eight what makes one character
    14·1 answer
  • The __________ is the system of official channels that carry organizationally approved messages and information.
    15·1 answer
  • When registering online for your classes you log onto to a website provided by your university. The computer and web browser tha
    6·2 answers
  • Jen's house contains the following devices:
    13·1 answer
  • Write the pseudocode for this flowchart
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!