1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alina [70]
3 years ago
9

Samira works for a large U.S. company that has factories all over the world. Samira returned to the U.S. after visiting several

of the factories and discuss the conditions at the factories with her CEO. Since the factories manufacture items that could affect the health of people purchasing their products, she was very concerned. The CEO decided that it wasn't worth the expense to make the needed changes. Samira decided that she was going to turn the company in to the authorities. What is the term that would be used for what Samira did?
a. Transparency
b. Whistleblowing
c. Stereotyping
d. Ethnocentrism
Computers and Technology
1 answer:
Brums [2.3K]3 years ago
6 0

Answer:

a. Transparency

Explanation:

What Samira actually did was Corporate Transparency. Her concerns about health of those people who purchased the company's products is right from the legal and moral point of views. There are several laws protecting consumers in the US. For example The Food and Drug Administration is in charge of ensuring that foods and medicines are safe for their consumption.

You might be interested in
I have tried installing "windows media player" on my computer but at a point, something disrupts its instalment or I am asked to
Minchanka [31]
Windows media player should come pre-installed on your system and does not cost anything. You likely have malware on your system. I would download Malwarebytes antimalware from here

https://www.malwarebytes.org/mwb-download/thankyou/

There is a premium version but just do the free one. Install and run. Let it get rid of the bad stuff it finds. I would also make sure you have an up to date Antivirus software and run a scan. There are plenty of good free ones if you don't have one installed already.
6 0
3 years ago
Columns are most useful for which tasks ?
amid [387]
Laying out newsletters and creating a visual appeal without images
5 0
3 years ago
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
ss7ja [257]

Answer:

Brute Force attack.

Explanation:

A network is a platform where end user devices like computers are connected to communicate and share resources. There are public networks and private networks.

A public network has its end devices and servers configured with a public IP address, which is routable on the internet, while private networks uses private IP addresses which can be used on the internet.

Private networks can be made accessable to public users by configuring an authentication and authorization policy, which could be one or a multi factor authentication. These requires a password and other factors to access the services of a private network.

An attacker can easily access a one factor or a password accessible user account, if the password is weak by using the process called a brute Force attack.

The brute Force attack exploits the vulnerability of weak passwords by entering possible valid combination from a defined set of possibilities.

6 0
3 years ago
5. Write a program to remove any duplicate letters from a word and display the new word maintaining the original order. For exam
dexar [7]

Answer:

word = input('Enter a single word: ', 's');

n = length(word);

nodupWord = [];

for i = 1:n

  dup = false;

  c = word(i);

  for j = 1:i-1

      if word(j) == c

          dup = true;

          break;

      end

  end

  if ~dup

      nodupWord = [nodupWord, c]; %add the non-duplicate char to end

  end

end

disp(['Adjusted word: ', nodupWord])

Explanation:

The code is in Python.

3 0
3 years ago
Kahnacademy sucksi am so mad i want to k ..<br> ill myself
ehidna [41]
No don’t do thattt ….
4 0
3 years ago
Other questions:
  • The specifications for ____ are developed by the world wide web consortium (w3c) and are continually evolving.
    13·1 answer
  • True or false: a cover letter accompanies a resume to showcase a job-seeker’s personal life
    6·2 answers
  • 안녕하세요! 한국어도 여기서 사용 가능한지 궁금합니다.
    6·2 answers
  • Multiple users report that the network printer, which is connected through the print server, is not printing. Which of the follo
    12·1 answer
  • Which is not an element of photography? a Cropping b Height c Directional Lighting d Framing
    11·1 answer
  • What is an example of a memo
    9·1 answer
  • The famous study entitled ""Protection Analysis: Final Report"" focused on a project undertaken by ARPA to understand and detect
    14·1 answer
  • Union Carbide accident safety policies and procedures were not followed was due to
    14·1 answer
  • What is the output?<br> &gt;&gt;&gt; password = "sdf#_356"<br> &gt;&gt;&gt; password.isalnum()
    8·2 answers
  • Compared with other PC operating systems, the Linux-based operating systems:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!