1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
3 years ago
13

Using your computer for non-work activities while you are being paid to work is known as ________. Select one: A. cyber sleeping

B. cyberloafing C. cyberbreaking D. cyberlazing
Computers and Technology
2 answers:
Anvisha [2.4K]3 years ago
7 0

Answer:

The correct answer for the given question is option(B) i.e cyberloafing.

Explanation:

Cyberloafing is defined as using the internet for non-work activities such as sending personal emails, chatting on social media sites etc during working .In this the employee using the internet for their personal use during working hours.

melamori03 [73]3 years ago
5 0

The correct answer is B. Cyberloafing.

Explanation

Cyberloafing is a term used to refer to a bad practice at work, specifically it refers to the loss of time surfing the internet of some workers who instead of spending time on their tasks, use the time to look at social networks, play or perform other activities browsing the internet. Cyberloafing can also be the product of job dissatisfaction, in this case it is a form of protest against work. So, the correct answer is B. Cyberloafing.

You might be interested in
Main function of Ubuntu
Lynna [10]

Answer:

Ubuntu includes thousands of pieces of software, starting with the Linux kernel version 5.4 and GNOME 3.28, and covering every standard desktop application from word processing and spreadsheet applications to internet access applications, web server software, email software, programming languages and tools

Explanation:

5 0
3 years ago
Read 2 more answers
If you want to design computing components for cars and medical
Marysya12 [62]

Computer engineering is the course you have to study if you want to design computing components for cars and medical equipment.

<h3>What Is Computer Engineering?</h3>

Computer Engineering is known to be one filed that is made up of the fields of electrical engineering and also that of computer science to form new kind of system hardware or software.

Based on the above, Computer engineering is the course you have to study if you want to design computing components for cars and medical equipment.

Learn more about Computer engineering from

brainly.com/question/24181398

#SPJ1

4 0
3 years ago
The _____________ loop allows the receiver to communicate with the sender in the imc process.
postnew [5]
Feedbacks
perhaps !!
<span>The feedback loop allows the receiver to communicate with the sender in the imc process.</span>
4 0
3 years ago
Your company needs to develop an Apex trigger in a sandbox to work with large amounts of records. The trigger needs to be tested
Svetllana [295]
C. Partial Copy Sandbox

5 0
3 years ago
Write the declaration statement for a two-dimensional array X of integers with five rows and five columns that accepts 25 intege
madreJ [45]

Answer:

int[ ][ ] X = new int[5][5];

It can also be declared and initialized this way:

  int[][] X = {

               {1,2,3,6,8},

               {4, 5, 6, 9},

               {7,5,6,8,9},

               {8,5,8,8,9},

               {10,2,6,8,11},

       };

Explanation:

Above is a declaration of a two-dimensional array that can hold 5*5=25 int values. A java program is given below:

public class JavaTwoD{

   public static void main(String args[ ]) {

       // creating the 5X5 array

       int[ ][ ] X = new int[5][5];

       // looping through the array to add elements

       for (int i = 0; i < X.length; i++) {

           for (int j = 0; j < X[i].length; j++) {

               X[i][j] = i * j;

           }

       }

5 0
3 years ago
Other questions:
  • The ________ model allows the owner of a resource to manage who can or cannot access the item. Owners maintain this access throu
    8·1 answer
  • 14. Which commercial RDBMS product was the first to hit the market and is the biggest?
    15·1 answer
  • What is an optical storage device?
    7·2 answers
  • When you purchase software in a box, reading the ________ is important to know if the software will function properly?
    13·1 answer
  • Suppose you are consulting for a bank that's concerned about fraud detection, and they come to you with the following problem. T
    13·1 answer
  • 9.2 code practice edhesive
    14·1 answer
  • Variable index has a value of 4, and variable accessValid has a value of False. What value does variable, accessPoints, have aft
    7·1 answer
  • What is the dark web and what is the .onion domain
    15·2 answers
  • Please tell fast plzzzzzzzzzzz.​
    9·1 answer
  • assuming the default gateway is connected to the internet, what type of internet access would this server have?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!