1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
4 years ago
6

Why do IT professionals have strict legal and ethical standards?

Computers and Technology
1 answer:
schepotkina [342]4 years ago
6 0

Answer:

The answer is B: The oath they took when they began their career.

Explanation:

You might be interested in
Can i uninstall adobe lightroom 6 and reinstall
ira [324]
Try transferring it onto a flash drive. Remove from computer, restart computer, and plug in. Its like a baby hard reset. It lets the app completely reset while keeping all the data as well as the computer clearing its cache.
8 0
4 years ago
Special variables that hold copies of function arguments are called _________.
NARA [144]

Answer:

Special variables that hold copies of function arguments are called parameters.

3 0
3 years ago
(05.01 MC)
KiRa [710]

Answer:

0xff

Explanation:

the thing is that hexadecimal always starts with 0x

and theres only one option that starts with 0x

4 0
3 years ago
State five differences between Dos and Windows.​
nalin [4]
1. DOS is single tasking OS. Windows is multi-tasking OS.

2. DOS consumes quite low power. Windows consumes high power.

3. DOS memory requirements are quite low. Windows memory requirements are quite high as compared to DOS.

4. DOS has no support for networking. Windows supports networking.

5. Multimedia is not supported in DOS. Windows supports multimedia likes games, videos, audios etc.
6 0
3 years ago
How many keys are utilized in symmetric cryptography?A. OneB. TwoC. ThreeD. Four
eimsori [14]

Answer:

A. One

Explanation:

Symmetric key cryptography makes use of one key. The same key is used for both encryption and decryption. This is different from asymmetric cryptography where separate keys are used for the two operations. Some examples of symmetric cryptography include:

  • Advanced Encryption Standard (AES)
  • Data Encryption Standard (DES)
  • Triple Data Encryption Standard (3DES)
  • Blowfish
7 0
3 years ago
Other questions:
  • What are the basic steps of programing??
    9·2 answers
  • What does the "e" in eSATA stand for?
    13·2 answers
  • Which of the following is NOT a search engine ( Bing, Yahoo, Ask, Twitter)
    6·2 answers
  • What is the purpose of using SmartArt Graphics and what is one way you can use SmartArt Graphics in your presentation(s)?
    11·1 answer
  • What is the full form of IE? ​
    9·1 answer
  • Jim wants to buy a car, but he’ll probably only need it for a couple of years. He has a short commute to work, so he won’t be pu
    5·1 answer
  • Manuel is recording a macro and made a mistake. What is the best option for addressing this situation? O Pause and rewind the ma
    11·2 answers
  • Dis-cord and/or snap????????????? Im 13 ! and a girl :)))))
    12·2 answers
  • What is a computer modem?​
    9·1 answer
  • I WILL GIVE MOST BRAINLY
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!