1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
4 years ago
8

Select the correct answer

Computers and Technology
1 answer:
Vaselesa [24]4 years ago
5 0

Answer:

professional integrity

Explanation:

The work he is doing is comes under the violation of professional integrity. Because professional integrity is the set of ethics that should be followed by the employ. These ethics includes honesty, loyalty and dependability.

You might be interested in
The first row of a table is often called the _____ row.
satela [25.4K]

ANSWER:

The first row of a table is often called the header row.

~batmans wife

7 0
3 years ago
Read 2 more answers
"A Windows laptop is being used by a teacher in an outdoor (but protected by an overhang) setting. What setting would ensure tha
iragen [17]

1.Click the battery btn and go into power option.

2.Go into "When to turn off display" from left side bar menu.

3.And select for brightness drop down as never dims the display.

This will make the display turn on, no matter if the PC keyboard btn or mouse hower is clicked or not.

4 0
3 years ago
What dose a bios system do?
ANTONII [103]
BIOS instructs the computer on how to preform basic functions such as booting and keyboard control. It is also used to identify and configure the hardware in a computer
4 0
3 years ago
Read 2 more answers
IBM’s system that is built on the middle ground approach to AI.
Norma-Jean [14]

Answer:

IBM Watson is AI for business. Watson helps organizations predict future outcomes, automate complex processes, and optimize employees' time.

Explanation:

6 0
3 years ago
A) How could you modify Shelve with a technique discussed in class so that you can create Shelve instances that contain // Tools
Kay [80]

Answer:

See explanation

Explanation:

A “shelf” is a dictionary-like object. A shelf is an arbitrary Python objects, that is; anything that the pickle module can handle. This includes recursive data types and objects containing lots of shared sub-objects. It must be noted that the keys are ordinary strings.

(A). modification to Shelve can be done by following this instructions;

(1). Do not redefine built-in functions,(2). grab shelved item, mutate item, write mutated item back to shelf.

The number (2) instructions is during iteration over shelved items.

(B). CREATING FUNCTIONS THAT TAKES IN TWO SHELVES;

import shelve

d = shelve.open(filename) # open -- file may get suffix added by low-level

# library

d[key] = data # store data at key (overwrites old data if

# using an existing key)

data = d[key] # retrieve a COPY of data at key (raise KeyError if no

# such key)

del d[key] # delete data stored at key (raises KeyError

# if no such key)

flag = key in d # true if the key exists

klist = list(d.keys()) # a list of all existing keys (slow!)

# or, d=shelve.open(filename,writeback=True) would let you just code

# d['xx'].append(5) and have it work as expected, BUT it would also

# consume more memory and make the d.close() operation slower.

d.close() # close it

3 0
4 years ago
Other questions:
  • Wanda wants to find some basic information about her computer, for example, what operating system and how much RAM are installed
    10·1 answer
  • What finacial behaivor will typically lead to a low credit score
    8·1 answer
  • Software that people commonly use in the workplace to make their lives easier is called
    15·1 answer
  • Which of the following is a preferable method to secure wireless access in a SOHO?
    12·1 answer
  • What is the name of the symbol that is used to classify and categorize information?​
    10·2 answers
  • Which kinds of Internet content do you think you need permission to use? Check all that apply.
    8·2 answers
  • Proszę daje wszystko potrzebuje tego
    8·2 answers
  • 1000base-t is a standard for achieving throughputs ____ times faster than fast ethernet over copper cable.
    8·1 answer
  • PLEASE HELP!!!
    11·2 answers
  • Which of these is a way of making applications less vulnerable to hacking?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!