1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin2010 [14]
3 years ago
11

Given half a chance other people at work will take advantage of you

Computers and Technology
1 answer:
Damm [24]3 years ago
3 0

have self-control and if you have a problem dont be afraid to speak your mind, show other people you mean buisness, but be polite to aviod starting more problems

You might be interested in
Which of the following is an example of a federal tax? A. Social Security tax B. Sales tax C. Property tax D. Transaction tax
Nastasia [14]
Property tax should be the correct answer
6 0
3 years ago
If you were the IT manager for a large manufacturing company,what issues might you have with the use of opensource software? Wha
Rzqust [24]

Answer: Having the ability to change the source code to fit your needs

Explanation:

7 0
3 years ago
Which is a common problem caused by the widespread use of computers?
Andru [333]
Hacking would be a widespread problem.
8 0
4 years ago
A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high s
Montano1993 [528]

Answer: This is private IP address

Explanation:

192.168.25.10 is a private IP address and is reserved for use only within an organisation so it cannot be used to communicate with the outside world. So in order to have videoconferencing they have to share their public IP addresses.

4 0
3 years ago
Please explain what steps you will take to prevent hackers from getting access to your personal information.
yuradex [85]
The steps I would take are 1. Making a strong password with symbols and numbers. 2. I will set up a 2 way authentication ther for if someone would be trying to hack me I would get an alert in order to stop the attempt. 3 I will not use the same password each time.
4 0
3 years ago
Other questions:
  • Due largely to the prevalence of reading them on screens rather than in​ print, the body text of most contemporary documents now
    8·1 answer
  • Write a java program that prompts the user to input the elapsed time for an event in hours, minutes, and seconds. The program th
    13·1 answer
  • PLEASE HURRY!!!
    11·1 answer
  • It is believed that Taiwan is the original home of these early Oceania explorers. Maori Lapita Polynesians Aborigines
    13·2 answers
  • Write a program that prompts the user to enter a grade, which is aninteger in the range of 0 - 100. Using if statements, have th
    11·1 answer
  • The post-closing trial balance shows the balances of only the ____ accounts at the end of the period.
    12·1 answer
  • How do you convert an algorithm to make it possible for a computer to read
    6·1 answer
  • Applications of the e-government​
    9·2 answers
  • If a user wants to change one small section of the formatting of a document and leave the rest the same, which
    5·1 answer
  • Structured query language (sql) enables data analysts to _____ the information in a database.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!