1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
4 years ago
12

Many major employers routinely monitor the performance of their employees through the computers and telephones they use. Employe

rs are allowed to
Computers and Technology
1 answer:
STALIN [3.7K]4 years ago
5 0

Answer:

Employers are allowed to check the number of keystrokes that word processors enter during the day.

Explanation:

An employer is authorized to monitor the activity of its employee when:

  • The employee authorizes it.
  • The employer owns the system to be used.
  • Surveillance is necessary for a strictly professional purpose.

By analyzing the keys pressed per day, the employer can determine the performance provided by its employees, and if they use the company's resources, for non-work purposes.

You might be interested in
You have recently been hired as the new network administrator for a startup company. The company's network was implemented prior
AleksAgata [21]

Answer: • Physically secure high-value systems

• Identify and document each user on the network

Explanation:

To develop a manageable network plan, the milestones include:

• prepare to document

• mapping network,

• protect your network

• network accessibility

• user access etc...

When identifying ways to protect the network, the tasks that should be completed are:

•®Physically secure high-value systems

• Identify and document each user on the network

4 0
3 years ago
Fill in the blank. The process that a wireless router uses to translate a private IP address on internal traffic to a routable a
AleksandrR [38]

Answer:

Network Address Translation (NAT)

Explanation:

With the aid of Network address translation(NAT), the IP addresses of a particular local network are translated or mapped into a single or multiple global or public IP addresses. Therefore, a wireless router could use NAT to translate its private IP address on internal traffic (network) to a routable address for the internet.

With NAT, businesses can use many internal IP addresses since they are just for internal purposes and will be eventually converted into a single or a few multiple routable IP addresses.

Three types of NAT are possible:

(i) Static NAT : There is a one - to - one mapping between private IP addresses and routable (public) IP addresses. One private IP is mapped to one public IP address.

(ii) Dynamic NAT : There is a many- to - many mapping between private IP addresses and routable (public) IP addresses. Multiple private IPs are mapped to many public IP addresses.

(iii) Port Address Translation (PAT) : Many - to - one relationship between the private IP addresses and public addresses. Many private IP addresses can be mapped or translated into a single public IP address. This type of NAT is also called NAT overload.

6 0
3 years ago
UDP provides unreliable data transfer and therefore
vova2212 [387]

Answer: The answer is d.

Explanation:

UDP is a transport protocol (Layer 4 of the OSI model) that has no mechanism to provide a reliable transport between the source process and the destination one, as TCP does.

Anyway, due to this feature, is specially suitable for real-time applications , like video or audio, provided that the user can accept some loss in the stream.

Several real-time protocols, like RTP for instance (used for videoconferencing)  use UDP as transport protocol.

4 0
3 years ago
how do you make a 3d project im a huge programer and I need to know how to do it or all I do will be considered retro gaming
aivan3 [116]
Bacon, go to the bacon! WORSHIP THE BACON!!!!!!!
6 0
3 years ago
According to your textbook, which of the following is a consequence of the quick development of new technologies in the digital
kramer

Answer:

E. Traditional leaders in communication have lost some control over information                                                              

Explanation:

Due to the quick development of new technologies like Internet, cable etc, traditional leaders in communication have lost some of their control over information. This means that the technological advancement is disruptive for traditional leaders. Following examples are given to elaborate the consequences of advancement in new technology in digital era.

With the establishment of new channels like CNN, Fox News and internet bloggers, the old television network news shows like ABC, NBC lost their audiences.

Email technology has taken on some of the postal service's responsibilities and outperforms attempts to control communication outside national borders. This replaced the postal mail which used to take months to reach the destination.

The Internet and social media websites are transforming the way in which we access and interact with media culture. Before internet most people would watch popular TV shows in  at the time they originally aired it. This  scheduling gave common media interactions at specific times within our society. We still watch these TV shows but now we watch them at our own ease through websites. Using You tube we can upload our own media instead of viewing mainstream television.

8 0
4 years ago
Other questions:
  • Combination keys perform a function when held down in combination with another key. true or false
    9·1 answer
  • You can encrypt individual files, but microsoft recommends encrypting at what level?
    9·1 answer
  • A _____, or spider, is a search engine program that automatically searches the web to find new websites and update information a
    14·1 answer
  • Which spreadsheet toolbar displays options such as Cut and Paste?
    6·1 answer
  • Steven, Marcos, and Juan are having a free-throw shooting contest. Each boy
    9·1 answer
  • Write the definition of a function named count that reads all the strings remaining to be read in standard input and returns the
    13·1 answer
  • Write a program that contains three methods:
    7·1 answer
  • A research study does not need to be well designed to be effective.<br> False<br> O True
    11·1 answer
  • Asking for certain data twice is
    6·2 answers
  • A student has completed some work at school and wishes to take it home. He could use a pen
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!