1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
11

todd’s manager had asked him to write a report on ways to increase safety in the warehouse Todda you to Internet to research sta

tistics in recommendations for improving safety in the workplace he feels like he pulled together really strong document to them is manager will be please whoever when he called into his managers office his manager is concerned and told him that he’s been an attic on his work what did Todd do
Computers and Technology
2 answers:
wariber [46]3 years ago
5 0
<span>The answer is : He likely did not cite his research, and committed plagiarism.  </span>Todd's manager has asked him to write a report on ways to increase safety in the warehouse. Todd used the Internet to research statistics and recommendations for improving safety in the workplace. He feels like he pulled together a really strong document and that his manager will be pleased. However, when he is called into his manager's office, his manager is concerned and tells him that he has been unethical in his work.  He likely did not cite his research, and committed plagiarism.   It is <span>the practice of taking someone else's work or ideas and passing them off as one's own.</span>

Rasek [7]3 years ago
3 0

Answer: He likely did not cite his research, and committed plagiarism

Explanation: APEX

You might be interested in
A security administrator has replaced the firewall and notices a number of dropped connections. After looking at the data the se
Nata [24]

Answer:

The correct answer is Option(A) i.e., An SQL injection attack is being

attempted.

Explanation:

In this given question some information is missing and is not the complete question. The missing is given as :

SELECT * FROM and ‘1’ = ‘1’

Which of the following can the security administrator determine from this?

A. The SQL injection attacked is being attempted.

B. An Legitimated connections is being dropped.

C. The network scan are being done by the system.

D. An attack of XSS is being attempted.

Now, coming to the answer "The security administration sees that an SQL injection is attempted while it notices a lot of connection dropped and has replaced with the firewall and will be the possible issue flagged on it, SQL injection is a type of injection that possibly executes harmful or malicious statements and effects any website or web application".

Hence the correct answer is Option A.

5 0
3 years ago
A _____ is a machine that changes information from one form into another.
gavmur [86]
The answer would be computer
5 0
3 years ago
Which is the answer
Alexxandr [17]

Answer:

table

Explanation:

it is meant to do it

6 0
3 years ago
Alcatel-Lucent’s High Leverage Network (HLN) increases bandwidth and network capabilities while reducing the negative impact on
Zinaida [17]

Answer:

The networks are intelligent and send packets at the highest speed and most efficiently.

Explanation:

Alcatel-Lucent was founded in 1919, it was a French global telecommunications equipment manufacturing company with its headquarter in Paris, France. Alcatel-Lucent provide services such as telecommunications and hybrid networking solutions deployed both in the cloud and on properties.

Alcatel-Lucent’s High Leverage Network (HLN) increases bandwidth and network capabilities while reducing the negative impact on the environment. This high leverage network can handle large amounts of traffic more efficiently because the networks are intelligent and send packets at the highest speed and most efficiently. HLN are intelligent such that it delivers increased bandwidth using fewer devices and energy.

Generally, when the High Leverage Network (HLN) is successfully implemented, it helps telecommunications companies to improve their maintenance costs, operational efficiency, enhance network performance and capacity to meet the bandwidth demands of their end users.

7 0
3 years ago
What does a theme contain?
meriva

A theme is a set of colors, fonts, effects, and more that can be applied to your entire presentation to give it a consistent, professional look.

4 0
3 years ago
Read 2 more answers
Other questions:
  • In the context of web and network privacy, an acceptable use policy is _____.
    15·1 answer
  • 13) Search engines and metasearch engines are examples of which network application?
    12·1 answer
  • Boardman College maintains two files—one for Sociology majors and another for Anthropology majors. Each file contains students'
    5·1 answer
  • GIVING BRAINLIEST Which feature of a database allows a user to locate a specific record using keywords?
    13·2 answers
  • What is the color of red?
    9·2 answers
  • This function causes a program to terminate, regardless of which function or control mechanism is executing.
    12·1 answer
  • Which platform is the best? (X-box, PC, Playstation, Nintendo Switch, Wii)
    10·1 answer
  • Which new console should i buy Nintendo switch Xbox series x or a ps5
    14·2 answers
  • 1. Explain the difference between a web browser and a search engine. (2 points)
    8·1 answer
  • A device is a program that must be installed in order for the peripheral device to be able to
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!