1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vilka [71]
4 years ago
9

Which of the following behaviors is considered ethical? copying another user’s password without permission hacking software to i

mprove its efficiency using a limited access public computer to watch movies deleting other user’s files from a public computer
Computers and Technology
2 answers:
Svetlanka [38]4 years ago
6 0

Answer:

using a limited acess public computer to watch movies

Explanation:

it is the only thing that could not get you in trouble

Komok [63]4 years ago
4 0
Answer) Using a limited access computer

Reasoning- Ethics is doing the right thing, copying someone’s password and hacking software aren’t aren’t the right things to do, but using a limited access computer is the right thing to do.
You might be interested in
A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a use
garri49 [273]

Answer:

A or S most likely (I think)

7 0
3 years ago
A group of cells is called a<br><br> Excel
arsen [322]

Answer:

Every worksheet is made up of thousands of rectangles, which are called cells. A cell is the intersection of a row and a column. ... You can also select multiple cells at the same time. A group of cells is known as a cell range

8 0
3 years ago
Answer will be marked brainliest
zhuklara [117]

Answer:

Normal laptop screen repair services cost AED 350 to AED 950 i think...

5 0
3 years ago
While adding information to the employee information database, Neil's computer crashed, and the entire database was erased. Whic
Varvara68 [4.7K]

Answer:

logic bombs

Explanation:

logic bombs -

It consists of certain coding , which is put into the software and will perform certain malicious function at the very correct time, is known as logic bomb ,

they are also known as time bomb.

It is a time of virus , but gets activated as soon as all conditions are met , which is coded in to the software.

Hence , from the given scenario of the question,

The correct term is logic bomb.

6 0
3 years ago
Cryptography is the science of secret writing. Cryptography involves creating written or generated codes that allow information
Rudiy27

Answer:

true

Explanation:

the answer is true dude

5 0
2 years ago
Other questions:
  • The rotor in a shaded pole motor consists of
    13·1 answer
  • What are the advantages and disadvantages of using thermoset plastics
    14·1 answer
  • In which of the following situations will a macro make your work more efficient?
    12·1 answer
  • The first step in the five-step process for problem solving is to ____. take action complete the task understand the task or nee
    10·2 answers
  • A SmartArt graphic consists of two parts: the SmartArt graphic itself and a(n) ____ pane.
    5·1 answer
  • Which principle suggests that specific single responsibility interfaces are better than one general purpose interface?
    13·1 answer
  • True or false mobile devices need to work within limited screen space
    6·2 answers
  • After several rounds of sessions and reviews, you finally have a list of confirmed requirements from a client in the music indus
    8·1 answer
  • Selective colleges choose to have in-person meetings to learn more about the applicants. These meetings are called:
    8·2 answers
  • Why is translator required ​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!