1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
4 years ago
12

Network Industries, Inc., wants to monitor its employees’ electronic com-munications. To avoid liability under laws related to e

mployee monitor-ing, Network should announce the monitoring to
Computers and Technology
1 answer:
kari74 [83]4 years ago
5 0

Answer:

the employees.

Explanation:

Employee monitoring refers to watch over employees activities using different methods to track their performance, protect secrets, avoid legal issues and for security concerns. However, this is in conflict with employees privacy because the company may be collecting personal information. So, companies that monitor their employees need to let them know about this so they fully understand what the company is doing and they agree to it. According to this, Network Industries, Inc., wants to monitor its employees’ electronic com-munications. To avoid liability under laws related to employee monitor-ing, Network should announce the monitoring to the employees.

You might be interested in
Write a C program (doublecopy) that allows a user to extract some part of an existing file (fileSource) and copy it twice to a n
Slav-nsk [51]

Answer:

Check the explanation

Explanation:

#include <stdio.h>

#include <sys/stat.h>

#include <stdlib.h>

#include <fcntl.h>

#include <errno.h>

#include <unistd.h>

extern int errno;

struct stat st;

int main(int argc, char **argv){

  int num1 = atoi(argv[1]); // Getting num1 from user

  int num2 = atoi(argv[2]); // Getting num2 from user

  char *fileSource = argv[3];

  char *fileTarget = argv[4];

 

  int source_fd = open(fileSource, O_RDONLY); // opening the file in read only mode

  int target_fd = open(fileTarget, O_WRONLY | O_CREAT); // opening the target file in Writeonly mode if file is not found it will create

   

  char *ch = (char *) calloc(num2+num1, sizeof(char));

 

  stat(fileSource, &st);

  if(st.st_size < (num1 + num2)){

      printf("File Size is smaller than the specified bytes\n");

      read(source_fd, ch, st.st_size); // reading the file upto the end

      write(target_fd, ch, st.st_size); // write to the file

      write(target_fd, ch, st.st_size); // two times writing to the file

  }else{

      if(lseek(source_fd, (off_t)num1, SEEK_SET) < 0 ) // moving the cursor to after the specified bytes from the start

      {

          printf("Some Error occured while seeking the file");

          return -1;

      }

      read(source_fd, ch, num2); // reading num2 bytes from the source

      write(target_fd, ch, num2); // writing two times to the target

      write(target_fd, ch, num2);

     

  }

 

  return 0;

 

}

1 2 #include <stdio.h> #include <sys/stat.h> #include <stdlib.h> #include <fcntl.h> #include <errno.h> #include <unistd.h> 4

The code screenshot and code output are attached below.

3 0
3 years ago
Which range function creates the following list of numbers?<br> 76 74 72 70 68 66 64 62
baherus [9]

Answer:

they look like even number

Explanation:

2 4 6 8 10 12 -------seeeeee but not hundred percent sure but plz put me in brainlist

4 0
3 years ago
Ashley works for a company that helps hospitals hire new doctors. They have written a list of strategies that can be used to int
enyata [817]

Answer:

A file.

Explanation:

A file can be defined as a computer resource used for the collection of data (informations) as a single unit.

Basically, files are of different types or in various formats (forms) and these includes document, video, audio, image, software application, data library etc.

Additionally, various operations such as open, close, edit, format, delete, save, rename, compress etc. can be performed on a file through the use of specific software applications or programs.

In this scenario, Ashley wants to give a list of strategies that can be used to interview doctors to their supervisor to review.

Hence, what Ashley should give to the supervisor to do a review is a file.

6 0
3 years ago
How do i block somebody on here, theyre making me have a panic attack. /srs
spin [16.1K]

Answer:

If someone is disturbing you a lo then you can report him/her.

  • Go to g-mail.
  • Type a message to US Support.
  • Add a screenshot of him/her whom you want to report.
  • Use polite words
  • At last, send it.

You will get soon response.

5 0
3 years ago
Read 2 more answers
Federal law requires safety training before workers or students enter the work area.
otez555 [7]

It is True.

According to federal laws in the U.S, an employer is required by law to provide training to all employees. The employees should acquire this knowledge and understanding and any skills necessary for the performance of the duties. The employer is also required to certify that the training has been accomplished.


8 0
4 years ago
Other questions:
  • A touch screen is classified as a special type of scanning device true or false
    15·1 answer
  • In two or more complete sentences, summarize the difference between renewable and nonrenewable resources? Justify your responses
    13·2 answers
  • What are two reasons for using layered protocols? what is one possible disadvantage of using layered protocols?
    13·1 answer
  • Melissa and Sue want to distribute a document to be discussed at a meeting starting in about thirty minutes. People will be atte
    14·1 answer
  • A student has created a Book class. The class contains variables to represent the following.An int variable called pages to repr
    11·1 answer
  • The mutating-table error is raised when a trigger attempts to execute a. an INSERT, UPDATE, or DELETE while another user is upda
    10·1 answer
  • Which of the following choices best completes the above flowchart?
    11·1 answer
  • Help me pls!!! last question
    9·1 answer
  • What is the final step when creating an appointment to ensure that the content of the appointment is stored in Outlook?
    13·1 answer
  • ...............is a personal computer that fits on desk.​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!