1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
g100num [7]
3 years ago
10

Which of the following behaviors is considered ethical?

Computers and Technology
2 answers:
gayaneshka [121]3 years ago
8 0

Answer:

using a limited access public computer to watch movies

Explanation:

It is the only one that will not get you in big trouble

kolezko [41]3 years ago
7 0

Answer:

answer is c. using a limited access public computer to watch movies

You might be interested in
In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo
kirill115 [55]
The word DoS refers to the Disk Operating System. In the case given above, if it happens that there is a distributed DoS attack, the attacker then sends messages directly to the BOTS. Bots refer to internet or web robots. Hope this answer helps. The answer is the first option.
4 0
4 years ago
Exercise 3.16.4: Happy Face Solita
enot [183]

first do a happy face and a circule thats it

7 0
3 years ago
The software that requests mail delivery from the mail server to an Internet device is known as mail ____ software.
OleMash [197]

The software that requests mail delivery from the mail server to an Internet device is known as mail client software.

Explanation:

Mail client software is a form of communication in which electronic messages are created and transferred between two or multiple devices connected to a network series or stream.

8 0
3 years ago
Financial stability is when u what
Mila [183]

Are in good standing money wise!

hope helped c;

3 0
3 years ago
Read 2 more answers
You work for manufacturing company who operate a hybrid infrastructure with systems located both in a local Datacentre and in AW
kotegsom [21]

Answer: Copy the files from the NAS to an S3 bucket with the One Zone-IA class

Explanation:

Th one Zone -IA class with S3 bucket has reduced cost but offers the same durability for which the files needs to be copied from NAS to access them faster.

8 0
3 years ago
Other questions:
  • Why OSI is called open system?
    8·1 answer
  • Explain why the control bus is not a bus.
    7·1 answer
  • Put these steps for managing your study time in chronological order. 1 set aside the same time each day 2 Identify the best time
    14·1 answer
  • When typing an outline, you can move a point from a lower level to a higher level by changing the list level from the outline me
    5·1 answer
  • A ____ typically rests on the desk or other flat surface close to the user’s computer, and it is moved across the surface with
    13·1 answer
  • Select the education and qualifications that are most helpful for business analysis careers. Check all that apply
    11·2 answers
  • Clarissa is a computer programming consultant. When a client states that they have an extremely complex programming task, which
    10·2 answers
  • What is the different sheets in excel
    15·1 answer
  • I know I'm asking for a lot. But this is my last question. If we do it I pass my semester. help please.
    15·1 answer
  • The main function of a(n) ____________________ is to centralize access control for the network by keeping an eye on both inbound
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!