1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
3 years ago
7

Standards for all managers ethical responsibilities are covered in a company's

Computers and Technology
2 answers:
asambeis [7]3 years ago
7 0
The answer would be C
attashe74 [19]3 years ago
4 0
C. Code of ethics is correct.
You might be interested in
How are Action Buttons different than hyperlinks?
ipn [44]

Actions buttons are different than hyperlinks in many ways.

2)They are predefined shapes.

<u>Explanation:</u>

Action buttons are predefined shapes in the PowerPoint and can be used for moving between the slides of the presentation and for referring to the hyperlinks as well.

Action buttons have a predefined shape and that shape can be used to set the functionality of that particular button as a convention. Action buttons make up a strong presentation.

Action buttons can be invoked by clicking on them or just hovering over them and various sound effects can also be added on both the events to make the presentation more engaging and attractive.

8 0
3 years ago
An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. Since the Internet is gaining devices qu
Vladimir [108]

Answer:

Explanation:IPv4 is almost used up due to the constant increase in devices so therefore IPv6 was implemented to combat this issue, IPv6 uses 128 bit addresses, allowing 3.4 x 1038 unique IP addresses. This is equal to 340 trillion trillion trillion IP addresses. IPv6 is written in hexadecimal notation, separated into 8 groups of 16 bits by the colons, thus (8 x 16 = 128) bits in total. Which essentially means both me and you wont see IPv6 run out in our life times nor will you kids kids.

4 0
2 years ago
​Lisa mentions that a program is developed to interact with other programs, and she wants to begin by testing the programs indiv
Ronch [10]

QC TESTER(quality testing process) is the name of this process.

To name this process call QC TESTER

<u>Explanation:</u>

Any software development environment their will QC testing (quality testing process) where end user will do or simulate complete testing of software make the software bug free.

After QC tester confirm the program as bug free then only software implementation team ready for implementation process. QC tester is important role in software development environment to find a bug on function, data input entry and monitor result from software and inform to software team with list of bug results.

This process will take place to and from between QC tester and software developer team till software become bug free.  

6 0
3 years ago
You are working with an older relative who is writing their last will and testament and you two are sharing the document back an
zloy xaker [14]

Answer:

In word there is a setting where you can mange all of user's permission in the document. These are a few permission settings: Read only and Can edit.

6 0
3 years ago
The internet and the World Wide Web were results of years of research by Pioneers such as Ray Tomlinson, Vincent Cerf, Vannevar
iren [92.7K]

Answer:

The Internet began as a US Department of Defense network named Advanced Research Project Agency Network (ARPANET) funded by the Advanced Research Project Agency (ARPA, later DARPA). In the 1970s, universities and other educational institutions began sharing this technology. The network grew as more and more users began sharing information.However, the information being shared on this network was very limited because of its government ties. The ARPANET was decommissioned in 1990. This move was followed by the commercialization of the Internet, which allowed it to carry business and personal traffic.

Explanation:

8 0
3 years ago
Other questions:
  • Why would a brokered CD pay more than a regular CD?
    13·1 answer
  • Science is a body of knowledge that extends back to Select one: a. the time of Galileo. b. Italy in the 16th century. c. Greece
    6·1 answer
  • . In many instances an IP address is used to access a server rather than a URL because a URL is more difficult to set up and eas
    10·1 answer
  • A report has a column of totals, with each total adding to the cell above it. What kind of calculated figure is this?
    15·1 answer
  • Explain in details three security countermeasures you know.​
    10·1 answer
  • Tom and his brother caught 100 finish on a weeklong fishing trip. The total way of the fish was 235 pounds. What is the weight o
    9·1 answer
  • The welcome screen of the program 123D consists of ___
    15·1 answer
  • 1. A bank customer invested $24 in a bank with 5 percent simple interest per year, write a program the construct a table showing
    11·1 answer
  • imagine that you wanted to write a program that asks the user to enter in 5 grade values. the user may or may not enter valid gr
    12·1 answer
  • what field in the ipv4 datagram header can be used to ensure that a packet is forwarded through no more than N headers
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!