1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
2 years ago
13

You work administrative assistant in an engineering firm. A co-worker constantly makes fun of the engineers by whispering commen

ts about their appearance and behavior. Read the following possible courses of action and decide which is the BEST way to handle the situation and which is the WORST way to handle the situation.

Computers and Technology
1 answer:
victus00 [196]2 years ago
4 0

Answer:

<u>BEST</u>

Option 4

<u>WORST</u>

2

Explanation:

Option 4 is the best cus confronting is better than just watching and letting it happen which in option 2 that's the case

You might be interested in
With _______, applications are owned, delivered and managed remotely by one or more providers over the Internet or an intranet,
vfiekz [6]

Answer:

EMAIL

Explanation:

3 0
3 years ago
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
Discuss the differences between a quantitative and qualitative risk analysis. Please write two paragraphs.
Burka [1]

Answer:We start each project to get some business benefits. We design it to achieve users and other stakeholder’s satisfaction. And we build it to improve organization KPIs. But, we live in a world where the project faces many uncertainties. These uncertainties or risks can prevent from achieving our project goals or objectives. So, it is critical that we identify them in time to take care of their effective responses.

The more we know our risks, the more we can evaluate and prioritize them timely for:

Reducing their probable negative impacts, or

Increase their likely positive impacts

We can use Qualitative Risk Analysis and Quantitative Risk Analysis techniques to evaluate and prioritize risks. I see there are a lot of confusions around how these two techniques are different from each other.  In this blog, I will address these confusions and differences between these two techniques.

Before we get into the difference between qualitative and quantitative risk analysis/assessment, it is mandatory to understand how we perform risk analysis in projects.  Below is the summarized demonstration of the risk analysis:

Explanation:

8 0
3 years ago
Jeff is a financial assistant. He needs to create a document for his client that tracks her stocks and calculates the loss or ga
seropon [69]
Spreadsheet. Brainliest answer plz??
4 0
3 years ago
Read 2 more answers
What is the reason that a modern electron microscope (TEM) can resolve biological images to the subnanometer level, as opposed t
zhannawk [14.2K]

Answer:

The correct answer to the following question will be "The wavelengths of the electron beams are also much shorter or less than illumination and visible light".

Explanation:

TEM seems to be a methodology of microscopy during which a pulse of electrons is transferred to create the effect through some kind of microscope, could approach biological objects at the sub-nanometer standard, as related to hundreds of nano-meters for either the absolute best microscope with super-resolution.

Also because of the electron beam's distances, they are still much shorter or smaller than daylight and infrared light, meaning that biological objects and artifacts can be resolved.

6 0
3 years ago
Other questions:
  • The syntax used for referencing cells with their worksheet names is the sheet name, followed by ____, then the usual column lett
    8·1 answer
  • Over the past week, every time Larry has started his computer, he has noticed that the time is not correct. Larry didn’t conside
    13·2 answers
  • It is important that data being imported from a text file into access are separated by a character, such as a comma, which defin
    8·1 answer
  • Given: The following if statement uses an overloaded &gt; operator to determine whether the price of a Car object is more than $
    5·1 answer
  • Janet manages the security of the database servers at the mortgage company where she works. The servers are Windows Server 2016;
    15·1 answer
  • Hackers who gain control over several computers can organize them into a client-server network known as a(n) __________ . This n
    7·1 answer
  • An overall indication of the dependability of data may be obtained by examining the ________, credibility, reputation, and _____
    15·2 answers
  • Why use LinkedIn automation for LinkedIn?
    10·1 answer
  • An Excel file that contains one or more worksheets
    15·1 answer
  • 8.6 Code Practice: Question 2
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!