1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dahasolnce [82]
3 years ago
7

Ethics is a way of behaving so that you are

Computers and Technology
2 answers:
konstantin123 [22]3 years ago
4 0

Answer:

b. Doing what is right.

Explanation:

I'm sure that if you've gone to a school concert or a poetry slam or something related to those, therefore you've heard of the word ethic. In this sense Ethic is to make sure you are doing what is right, for example guidelines you need to follow. If you are at a concert, at the beginning of it, someone might say what they expect of you. For example, please don't use the flash on your camera because it is distracting, is an example of using ethics because you know that you shouldn't do it. Another more common example, would be at the movie theatres, you need to turn of your phone. When you are watching a movie you are more intrested in what is happening there than on your phone, And even if you don't care about the movie, people around you might, and Its important that you follow those basic rules because you are doing what is right.

vichka [17]3 years ago
3 0

Answer:

Doing what is right I think

You might be interested in
⚠️JAVA⚠️<br> how did the output come like this ?
Morgarella [4.7K]
The first %d is the result of num 1 /bum 2
7 0
3 years ago
8. What is the order of growth execution time of the push operation when using the LinkedStack class, assuming a stack size of N
velikii [3]

The order of growth execution time of the push operation when using the LinkedStack class, assuming a stack size of N is; O(1)

<h3>Understanding Computer Programming Language</h3>

Let Top be the position of last element inserted in Array.

For Push operation, the process is as follows;

if(Top == last index of Array) {

Printf(“Stack Overflow”)

} else {

Top = Top + 1

a[Top] = element you want to insert

}

Read more about Computer Programming at; brainly.com/question/22654163

8 0
2 years ago
You are hired by a game design company and one of their most popular games is The Journey. The game has a ton of quests, and for
Kamila [148]

Answer:

Explanation:

Let's describe the connected part for the very first time.

Component with good connections:-

A semi in any graph 'G' is defined by a way to align element if this can be crossed from the beginning of any link in that pixel or if this can be stated that there is a path across each organized node pair within this subgram.

Consecrated pair means (ni, nj) and (nj, ni) that 2 different pairs would be regarded.

In point a:

We're going to be using contradictions for this segment. They start with the assumption that two lucky journeys are not even in the same strongly interconnected component.

For instance, qi and qj are providing special quests that were not in the very strongly linked element and which implies that, if we start to cross from qi or qi, then qj cannot be approached if we begin to move through qj and as we established if qi or qj is fortunate contests, we may reach any other hunts. Which implies qj from qi or conversely should be reachable. Or we might claim that qi is part of the strongly linked portion of qj or vice versa with this situation.

Consequently, we would not be capable of forming part of a different and strongly linked element for two successful scientists; they must have the same strongly related to the element.

In point b:

Its definition of its strong, line segment indicates that all other searches within such a strongly coordinate system can be made possible from any quest. Because if all quests are accessible from any quest then a lucky search is named, and all other quests can be accessed from any quest in a very coordinated system. So, all contests are fortunate contests in a strongly connected element.

Algorithm:

Build 'n' size range named 'visited' wherein 'n' is the number of graphic nodes that keep records of nodes already frequented.  Running DFS out of every unknown vertex or mark all edges as seen.  The lucky search will be the last unexplored peak.

Psuedo-Code:

Requires this functionality to also be called Solution, it requires 2 reasons as an input, V is a set of objects in graph 'G' and 'G' is a chart itself.

Solution(V, G):

visited[V] = {false}//assign value

for v: 0 to 'V'-1:  //using for loop

if not visited[v]:  //use if block

DFS(v, visited, V, G)  //use DFS method

ans = v //holding value

return ans //return value

3 0
3 years ago
Read 2 more answers
Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other
dezoksy [38]

Answer: False

Explanation:

 The given statement is false, as the alarm filtering is the process of classifying the various type of IDPS alert in the system and it can be managed more efficiently.

The IDPS administrator can easily set an alarm filtering in the running system. It can generate the various types of positive tract in the system and then adjust the different alarm classifications. Alarm filters are same as the packet filter in which they can easily filter the items from the source and destination IP address.

3 0
3 years ago
1, How can technology serve to promote or restrict human rights? [2 points]
prisoha [69]

Answer:

Examples of how technology can be used as a powerful tool for human rights are ever expanding. Newer technologies such as artificial intelligence, automation, and blockchain have the potential to make significant positive contributions to the promotion and protection of human rights.

7 0
3 years ago
Other questions:
  • Judy is searching for files with a .jpg file extension on her laptop. Which type of file is she looking for?
    13·2 answers
  • Nathan, a civil engineer in a construction company, is one of the best performers in the organization. He is assigned challengin
    9·1 answer
  • In nutanix command-line interface (ncli) commands, each entity has a unique set of actions, but a common action across all entit
    15·1 answer
  • All of the following are typical characteristics of internet predators, except white. male. between the ages of 18 and 35. high
    7·1 answer
  • The _____ unit is the preferred style unit for web page text because it makes it easy to develop pages in which different page e
    10·2 answers
  • You are developing open-source software based on existing source code developed by someone else. What is the term for the piece
    9·1 answer
  • What information and options can be found on the File tab?
    8·1 answer
  • Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to pi
    8·1 answer
  • What are the five Ws?<br> (I don’t even know what this means)
    5·2 answers
  • And<br>Why the computer is called dilligent<br>Versatile machine?give long answer ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!