1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
3 years ago
9

You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r

eport this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19), Protecting Whistleblowers with Access to Classified Information.A. TrueB. False
Computers and Technology
1 answer:
Irina-Kira [14]3 years ago
3 0

Answer:

A. True.

Explanation:

In this scenario, you are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19): Protecting Whistleblowers with Access to Classified Information.

In USA, the Presidential Policy Directive 19 (PPD-19) which was signed by President Barack Obama in October 2012, is an executive order designed to provide significant protection for an employee who have access to classified informations such as fraud, waste of money and abuse or prohibiting any form of retaliation against this cleared employee.

You might be interested in
What kind of eolr would you need to not have a open trouble on the facp
zhannawk [14.2K]

Answer:

here are three basic categories for fire alarm panel signals: trouble, supervisory, and alarm. Trouble Signal. A trouble signal is typically designated by a yellow light and means that there is an operational issue. For some more advanced systems, the panel may indicate the kind of problem and where it is located.

Explanation:

8 0
3 years ago
Write a recursive method, numToString, that takes two arguments: num, the number to convert, and base, the base to represent the
AnnyKZ [126]

Answer:

This is the required code:

Explanation:

public class NumberToString {

   public static String numToString(int num, int base) {

       final String digits = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ";

       if (num < base) {

           return "" + digits.charAt(num);

       } else {

           return numToString(num / base, base) + digits.charAt(num % base);

       }

   }

}

6 0
3 years ago
Suppose a program is operating with execution-time binding and the physical address generated is 6730. The relocation register i
zaharov [31]

Answer:

730

Explanation:

Calculation for What is the corresponding logical address

Using this formula

Corresponding logical address=Physical address generated-Relocation register

Let plug in the formula

Corresponding logical address=6730-6000

Corresponding logical address=730

Therefore the corresponding logical address will be 730

4 0
3 years ago
Enumerations can contain ___________ values.
NISA [10]

Answer: (A) Only unique

Explanation:

 Enumeration basically contain only unique value as enumeration is define as the set of the numeric values that is finite and it is represent specifically by the identifiers which is known as the enumeration constant.  

It only work with the finite values and also hide all the un-relevant and unnecessary information from the programmers. Enumeration is the type of the data type variable which contain only previous declared values.  

7 0
3 years ago
using the class c ip address 195.1.1.0 (class c means that only the last octet can be used for subnet and host addresses, or sta
Lelechka [254]

Answer:

Explanation:

Given a class C IP address

195.1.1.0

Existing mask is 255.255.255.0

We want to have 12 hosts on 10 subnets.

A class C address has 8 bits of the host which will give, n=8

2ⁿ - 2 = 254 hosts

Current mask= 255.255.255.0

Bits needs for 10 subnets

2ⁿ = 10, n = 4bits

n = 4 = 2⁴ = 16 possible subnets

Now, bit needed for 12host, n =4bits

2⁴-2 = 14 possible host,

Total of 8 bits needed so therefore we can use as 4bits for the subnet.

So we could have

4 bit subnet and 4 bits hosts

11110000 = 240decimals

Final possible masks is

255.255.255.240

5 0
3 years ago
Other questions:
  • Read the following code carefully and do as directed: int main() { // Initialising starting number int num = 1; int n=7 // Outer
    5·1 answer
  • In the world of computers, the term ____ refers to the computerâs physical components, such as the monitor, keyboard, motherboar
    14·1 answer
  • Mica's creating his web page with a software that is free of charge for the first month. If he likes the program, he will have t
    7·2 answers
  • "Memory refers to: A.the brain processes involved in the encoding, storage, and retrieval of information. B.the mechanisms drivi
    9·1 answer
  • The modulus ( % ) actually gives you the ___________ of an integer division problem.
    14·1 answer
  • The person who can give a short defination of subroutine will get the brainliest.
    9·1 answer
  • For the description below, develop an E-R diagram:
    9·1 answer
  • Please Help Me!!!!!!!!!!!!!
    5·1 answer
  • Unconformities develop when new sedimentary layers accumulate atop old, eroded layers, resulting in a geologic hiatus. Which of
    9·1 answer
  • Which of the following is an advantage of text HTML editors over plain text editors?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!