1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenaWriter [7]
3 years ago
13

Question #6

Computers and Technology
2 answers:
borishaifa [10]3 years ago
5 0
Answer:
D. Stealing


Explanation:
Rewriting someone’s words. “Plagiarism” is known as stealing someone’s words.
saveliy_v [14]3 years ago
4 0

Answer:

D. Stealing

Explanation:

Plagiarism is "the practice of taking someone else's work or ideas and passing them off as one's own."

In other words, stealing someone's words and claiming them as your own.

Plagiarism is illegal with fines of anywhere between $100 and $50,000.

So, be sure to put quotes (") around published articles or paragraphs if it's for an assignment. If it's not an assignment, don't use it. Unless you wanna be fined anywhere between $100 and $50,000

You might be interested in
Suppose a switch is built using a computer work station and that it can forward packets at a rate of 500,000 packets per second,
Marina86 [1]

Answer:

When the transmission exceeds 667 packets

Explanation:

In computer networking, a packet is a chunk of data transmitted across the network. The packet size of an Ethernet network is 1.5kilobytes, while the packet size of an IP packet payload is 64 kilobytes.

A switch is a physical network device that connects nodes or workstations while communicating the packets (or frames). The I/O bus size bandwidth is 1Gbps which allows approximately 667 packets. Once this packet size is crossed, the bus becomes a limiting factor or bottle neck.

3 0
3 years ago
identify at least three additional ethical responsibilities expected from a computer professional. In brief, explain each respon
kompoz [17]

The ethical responsibilities for computer professionals are:

Respect Confidentiality.

Maintain professional competence.

Respects and protection of personal privacy.

Explanation:

  • Computer professionals are expected to conduct themselves in an ethical manner.
  • Codes of ethics exist in this field to help these professionals make good decisions about the manner of their professional work.
  • A computer professional must strive to provide the highest quality of work possible by acquiring and maintaining professional competence. He should be knowledgeable in the laws pertaining to his profession and not violate them.
  1. Respect Confidentiality : Confidentiality refers to protecting information from being accessed by unauthorized parties. Only the people who are authorized to do so can gain access to sensitive data. All the security incidents reported in the media today involve major losses of confidentiality.
  2. Maintain professional competence : The capability to perform the duties of one's profession generally, or to perform a particular professional task, with skill of an acceptable quality. Maintaining professional competence allows individuals to learn throughout their career, to develop technical skills, and to keep pace with accountancy changes.
  3. Respects and protection of personal privacy : Privacy computing includes all computing operations by information owners, collectors, publishers, and users during the entire life-cycle of private information, from data generation, sensing, publishing, and dissemination, to data storage, processing, usage, and destruction.

8 0
4 years ago
Change the function definition for myint so that xyzfunc uses the same memory locations for myint as in the calling program.
sattari [20]

Answer:

b) void xyzfunc (int &myint);

Explanation:

To use the same memory location as the variable in the calling function we have to pass the variable by reference means passing the same address to the function.So to do that we have use & operator which stands for address.

We will do this as following:-

void xyzfunc (int * myint);

Hence the answer is option b.

8 0
4 years ago
Need help with this question please help it’s on c++
yan [13]

Answer:

b

Explanation:

if you look at the end of the code it brings c back but for it to do that it has to make a newline.

8 0
3 years ago
What is the purpose of a email
jasenka [17]

Answer:

An email is a digital message sent electronically from one computer to one or more other computers. Emails are flexible and can be used for giving instructions, serving as documentation, providing confirmation, communicating rules and procedures, making recommendations, providing a status update, making an inquiry.

7 0
4 years ago
Read 2 more answers
Other questions:
  • How do i divid 521 to the nearest tenth
    12·2 answers
  • A(n) __________ is a popular way to describe relationships? (i.e., one-to-one,? one-to-many) in a relational database.
    14·1 answer
  • How do you launch windows on a computer?
    14·1 answer
  • Explain the difference between the legal protections a security officer enjoys and the legal protections a police officer receiv
    12·2 answers
  • ______ allows a thread to run on only one processor.
    6·1 answer
  • Write a program using integers userNum and x as input, and output userNum divided by x three times.
    11·1 answer
  • In the lab, you created a Group Policy Objects Report and a Resultant Set of Policy Report that can be used to __________ the gr
    11·1 answer
  • you crossed two heterozygous red flowers (dominant color), what are your chances to have a white flower
    11·1 answer
  • . Is it conceivable to design a secure operating system for these computer systems? Give arguments for and against.
    6·1 answer
  • Which element is the first thing you should complete when making a movie?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!