1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVETLANKA909090 [29]
3 years ago
7

Dave is a recruiter for a large video and animation firm. He is looking for an employee who is willing to give productive hours

to activities related to the job. Which quality is he looking for? A. responsibility B. flexibility C. trust D. reliability E. integrity
Computers and Technology
1 answer:
kumpel [21]3 years ago
3 0

Answer:

reliabitlity

Explanation:

You might be interested in
Which of the following is a principle that can improve the efficiency of I/O?
natulia [17]

Answer:

C)

Explanation:

One principle that can improve the efficiency of I/O would be to move processing primitives into hardware. Primitives are a semantic value representing something else such as words or numbers within the programming language. By moving them into hardware they system is able to read them at a much faster speed making the I/O more efficient.

5 0
3 years ago
Read 2 more answers
Oracion con punto focal​
gizmo_the_mogwai [7]

Answer: Prayer with focal point

Explanation:

7 0
3 years ago
Why, y did brainly just do that........or did it just happen to me
Art [367]

Answer:

no clue but I just lost all my progress except my rank

Explanation:

5 0
3 years ago
Read 2 more answers
The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects
ddd [48]

Answer:

The statement is True

Explanation:

When talking about computer security, we can define covert channels as an attack on a system capable of creating a loophole for information objects transfer between various processes that would normally not allow communication under the computer security policy. Hence, the best defenses system against this kind of attack is via Intrusion Defense System and Intrusion Prevention System and relentlessly "watching all aspects of an IT infrastructure for aberrant or abnormal events of any type."

7 0
3 years ago
during zach's second visit of the year, he incurred a $450 bill. Describe how much is paid by Zach and the insurance carrier
icang [17]
Idk just need points
6 0
3 years ago
Other questions:
  • Use a spreadsheet to solve this business problem. The owners of an electronics store want to find which of their products makes
    12·1 answer
  • _____, which are generated by web server software, record a user's actions on a web site. viruses log files junk e-mails worms
    7·1 answer
  • Which of the following is 1000 of a second​
    15·1 answer
  • John just opened a savings account and wants to maximize the account of interest you earn which of the following actions would e
    13·1 answer
  • Which one of the following analog VOM ranges would be selected to measure a DC current of 90 milliamps? A. 10A B. 10mA C. 100mA
    5·1 answer
  • A computer programme that tells the computer how to perform particular tasks
    8·1 answer
  • What do you do to add a line or circle to your presentation?
    7·2 answers
  • What private service may occur on a web server?
    7·1 answer
  • What are possible penalties if a designer is caught breaking copyright laws?
    13·1 answer
  • How do cyber criminals target user’s end devices?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!