1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lapatulllka [165]
4 years ago
8

Why are ethics important in PR?

Computers and Technology
1 answer:
Kisachek [45]4 years ago
4 0

Answer:

Ethics are important to help gain trust, retain employees and can lead to greater innovation in the industry.

Explanation:

The PRSA ethical code includes the professional values of advocacy, honesty, expertise, independence, loyalty and fairness

You might be interested in
What is shotgun microphone?
astra-53 [7]

Answer:

A type of microphone characterized by an extremely directional polar pattern. Shotgun mics may be condenser or dynamic, but are almost always built with a long (8 to 24 inch) tube protruding from the front.

Explanation:

Shotgun mics are long, narrow tubes with slits evenly spaced along each side and a capsule near the rear end.

6 0
2 years ago
Write a program which reads in a single integer 0 <= n < 30 and prints out the factorial of n. Factorials get very big ver
Alexus [3.1K]

Answer:

The solution code is written in C++

  1. #include <iostream>
  2. using namespace std;
  3. int main()
  4. {
  5.    int num;
  6.    signed int factorial = 1;
  7.    
  8.    cout<<"Input a number: ";
  9.    cin>> num;
  10.    
  11.    if(num >= 0 && num <30){
  12.        
  13.        for(int i = num; i > 0; i--){
  14.            
  15.            if(factorial * i < 2147483647 && factorial > 0){
  16.                
  17.                factorial *= i;
  18.                
  19.            }else{
  20.                
  21.                cout<<"Can't handle this";
  22.                return 0;
  23.            }
  24.        }
  25.        cout<<factorial;
  26.    }
  27.    return 0;
  28. }

Explanation:

Firstly, let's create variable num and factorial to hold the value of input number and the factorial value. The variable factorial is defined with a signed int data type (Line 7-8).

Next prompt user input a number and do input validation (Line 10 -13). Then create a for-loop to calculate the factorial of input number (Line 15 - 26). Within the loop, create an if-else statement to check if the factorial of n is more than the limit, if so display the message "Can't handle this". Otherwise, the program will just print out the factorial after completing the loop (Line 28).

8 0
3 years ago
Read 2 more answers
Suppose a classmate constructed an electric motor with a solid commutator.that is, the commutator has no split. This solid commu
professor190 [17]
<span><em>The motor would work if using DC current. The split commutator acts to change the AC to DC for the motor.</em>

<em>                              Hope this helps:)</em>

</span>
3 0
4 years ago
What makes a source credible?
g100num [7]

Answer:

C It is believable or trust worthy

4 0
3 years ago
Read 2 more answers
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
avanturin [10]

Answer:

A. Spoofing

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.

Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take

7 0
4 years ago
Other questions:
  • Simplify (6x+6)+(-3-4x) please hurry!!!!!
    6·1 answer
  • What are three situations when recursion is the only option available to address problems?
    10·1 answer
  • Tiff is the default file format for most digital cameras. <br> a. True <br> b. False
    12·1 answer
  • Signs that a listener is paying attention include:
    10·2 answers
  • A new company will have 40 workstations in one building sharing a single network. All users must be able to share files and prin
    9·1 answer
  • Answer to this if you have apex legends on either pc xbox one or PS4 for the one that answers and does gets brainliest please do
    7·2 answers
  • In Broadbent's filter model of attention, the stages of information processing occur in which order?
    9·1 answer
  • The ____ contains app buttons that allow you to quickly run the File Explorer or Microsoft Edge apps.
    12·1 answer
  • I’m printing a paper but it told me “printer has a paper jam” what does that mean?
    6·1 answer
  • A web application's code prevents the output of any type of information when an error occurs during a request. The development t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!