1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
3 years ago
15

Which clauses in the Software Engineering Code of Ethics are upheld by a whistleblower (check all that apply). "Respect confiden

tiality" "Only use property in unauthorized ways" "Discloses actual/potential dangers" "Help create an environment supporting ethical conduct"
Computers and Technology
1 answer:
valkas [14]3 years ago
4 0

Answer:Discloses actual/potential dangers

              Help create an environment supporting ethical conduct

Explanation: The clauses that are presented by the Code of Ethics for software engineering which are upheld by a whistle blower are termed as  1.03, 1.04 and 6.08.These describe about the below mentioned terms:-

  • 1.03-it gives permission to software by receiving assurance that it meets the requirement, protected , good qualities and other such testable factors.
  • 1.04- Disclosing to the correct and reliable person regarding any potential danger towards the user.
  • 6.08- reporting errors and malicious activities, detecting it  ,correcting those errors etc so that software conduct can work smoothly.

You might be interested in
Write a function named countWords that reads in a line of text into a string variable, counts and returns the number of words in
algol13

Answer:

function countWords(sentence) {

return sentence.match(/\S+/g).length;

}

const sentence = 'This sentence  has five  words ';

console.log(`"${sentence}" has ${countWords(sentence)} words` );

Explanation:

Regular expressions are a powerful way to tackle this. One obvious cornercase is that multiple spaces could occur. The regex doesn't care.

3 0
3 years ago
Stacy's job involves direct coordination and communication with end users. Which option describes her job role?
masha68 [24]

Answer:

Stacy works as a Customer Service Representative.

Explanation:

Since Stacy uses coordination and communication, she would best fit the criteria for costumer service. A Customer Service Representative (CSR) helps customers out with questions about a business, including directions, finances, and other benefits of her company.

3 0
3 years ago
The Internet is a worldwide network. What is the World Wide Web?
kolbaska11 [484]
 World Wide Web (WWW) is a network of online content that is formatted in HTML and accessed via HTTP
7 0
3 years ago
Differences between unions and structures
vovikov84 [41]

Answer:

A structure is a user-defined data type available in C that allows to combining data items of different kinds. Structures are used to represent a record. A union is a special data type available in C that allows storing different data types in the same memory location.

3 0
3 years ago
How can the storage model assist in the design of storage networks?
kupik [55]

Answer:

 The storage model basically used for protecting the confidential data and information. It is important for the security purpose during the accessing of the data to make it more easy.

There are basically different types of storage model that used to assign in the designing of the storage network are:

  • Hard drive storage is basically used for the data storage in the local hard drive which is used by the sever.
  • Online storage is one of the most secure and most secure choices, the information is put away on various framework which help in protected and secure exchange of the information regardless of whether one of the framework is fizzled. it is also known as cloud storage device.
  • The network storage is also used fr storing the data in the server.

7 0
3 years ago
Other questions:
  • Compare the two types of formatting that IDE devices must go through. What is the primary difference between the two?
    8·2 answers
  • Does toontown rewritten carry spyware or malware
    9·1 answer
  • Describe how implementation of a raid level 2 system would be beneficial to a university payroll system
    12·1 answer
  • When was the federal commission act put into effect?????
    13·1 answer
  • Which screen should be open to customize or personalize a desktop background
    11·1 answer
  • Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?
    11·1 answer
  • A digital camera is an_____​
    6·2 answers
  • What are the top 10 most dangerous computer viruses ?
    13·1 answer
  • Different between embedded computer &amp;<br> Micro controllers
    8·1 answer
  • Does the source MAC address match your PC interface?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!