1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
g100num [7]
3 years ago
10

Which of the following behaviors is considered ethical?

Computers and Technology
2 answers:
gayaneshka [121]3 years ago
8 0

Answer:

using a limited access public computer to watch movies

Explanation:

It is the only one that will not get you in big trouble

kolezko [41]3 years ago
7 0

Answer:

answer is c. using a limited access public computer to watch movies

You might be interested in
Suppose that a local area network requires seven letters for user names.​ lower- and uppercase letters are considered the same.
Naddik [55]
<span>If a user name can have seven letters (with no distinction between upper and lower case), and if a letter can be repeated, then the maximum number of names is 26x26x26x26x26x26x26, or 8,031,810,176. That is, slightly more than eight billion names are possible.</span>
6 0
3 years ago
In how many ways can the letters of the word APPROXIMATION be arranged?
ZanzabumX [31]

Answer:

2494800

Explanation:

A lot of math and time.

5 0
3 years ago
Which soft skill involves the ability to work harmoniously with your colleagues and improve productivity?
Lina20 [59]
B.Teamwork is a soft skill involves the ability to work harmoniously with your colleagues and improve productivity. It is the collaborative effort of a team to complete a task or to achieve a common goal in the most effective and efficient way.  

 


4 0
3 years ago
. Mercury, Venus, Earth, and Mars are the closest planets to the Sun
DIA [1.3K]

Answer:

<h3>True</h3><h2>Mercury  is the nearest</h2>

Explanation:

I hope this helps

4 0
3 years ago
If you used the VLookup function, where would it look for a value?
zheka24 [161]

Answer:

rowwww potapot FG fhvnhtbrhabeynrynrynebeynye eynry eyney eyney e ye enegbe

4 0
3 years ago
Read 2 more answers
Other questions:
  • What are smart mobile devices?
    6·2 answers
  • You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the
    15·2 answers
  • To enter a typed number into a cell, you press Tab or Backspace?​
    7·2 answers
  • 1000base-t is a standard for achieving throughputs ____ times faster than fast ethernet over copper cable.
    8·1 answer
  • Exchanging which type of data uses the least bandwidth?
    7·2 answers
  • Each new term in the Fibonacci sequence is generated by adding the previous two terms. By starting with 1 and 2, the first 10 te
    13·1 answer
  • What is a written or electronic document that outlines etiquette policies for using networks and network resources?
    8·1 answer
  • Complete the problem about Olivia, the social worker, in this problem set. Then determine the telecommunications tool that would
    11·1 answer
  • "True or False? Software designers use layering and other techniques to organize large software systems."
    13·1 answer
  • python. create a program that asks the user to input their first name and their favorite number. Then the program should output
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!