1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin [286]
3 years ago
9

Tommy only thinks about his own gains and does not care about the team objectives. What quality is he demonstrating?

Computers and Technology
2 answers:
spayn [35]3 years ago
7 0
Selfishness I believe..
GarryVolchara [31]3 years ago
4 0
He is having an extreme ego and pride and is being greedy and unrespectful 
You might be interested in
Are you concerned that strangers may have access to the personal information you share on social media platforms? Why or why not
GuDViN [60]
It makes me a little uneasy at times, yes, but I know that they cannot find me unless I share way too much.
Hope this helps~!
~{Oh Mrs. Believer}
4 0
3 years ago
Choose the option that best matches the description given. The older term, social service, referred to advancing human welfare.
egoroff_w [7]

Answer:

Social Assistance

Explanation:

Provision and disbursement of intervention in other to palliate the suffering and want of an individual, group or community can be described as rendering social assistance. Assistance which also means helping people fulfill their needs could be offered by the government, non-governmental organizations or individuals personnels. Rendering social assistance could be in the form of cash or gift offerings, provision of food for the hungry, shelter for the homeless, medical interventions for the sick and catering for other touch points of the needy.

4 0
3 years ago
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
bookmark question for later what database did zach choose? microsoft excel microsoft access db2 oracle
Veronika [31]

Zach chooses the databases is Oracle

<h3>Explain about the databases?</h3>

Information that is organized into a database is made available for quick administration, updating, and access. Network databases, object-oriented databases, and hierarchical databases are all types of databases.

According to the TOPDB Top Database index, Oracle is the most widely used database with 32.09% of the market share. Computer databases often hold collections of data records or files containing information, such as sales transactions, customer data, financials, and product information My SQL, with a score of 16.64, is in second place, while SQL Server, with a score of 13.72 percent, is third. Since at least 2006, Oracle has dominated global database searches, making it the most used database not just in 2022.

To learn more about databases refer to:

brainly.com/question/28255661

#SPJ4

5 0
1 year ago
A hard drive that uses fde is often referred to as a(n) ____.
Sergio039 [100]

FDE stands for full disk encryption. FDE encrypts data as it is written to the disk and decrypt data as it is read off the disk. It is the simplest method of deploying encryption ,transparent to applications, databases, and users.

A hard drive that uses FDE is often referred to as a self-encrypting hard drive. correct answer: B

6 0
3 years ago
Other questions:
  • Assume the existence of a Building class with a constructor that accepts two parameters:_________ a reference to an Address obje
    5·1 answer
  • How would you insert a section break in a document?
    10·1 answer
  • Ryan wants to ensure that all the words in this document are evenly spaced so that they look neat and readable . Which option in
    12·1 answer
  • Add a throw statement to the processNumbers function that throws the message "All elements in the list should be numbers." if on
    12·1 answer
  • What is the correct method to use Dreamweaver to find broken links and orphaned files?
    15·1 answer
  • The material placed around the ignition device to feed the flame in arson is referred to as
    8·1 answer
  • Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It
    13·1 answer
  • Ethan is a systems developer. He is working on a system where he will implement independent solutions for different processes. W
    7·1 answer
  • Look at the following code:
    7·1 answer
  • While organizing his computer's power cords, Matt realizes his printer power cord is frayed (coming apart). What should Matt do
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!