1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maksim231197 [3]
3 years ago
5

1. What makes discrimination different from harassment? (Don't give me definitions.)

Computers and Technology
1 answer:
-BARSIC- [3]3 years ago
7 0
Discrimination includes acting against a race whereas harassment isn’t not allowing a race to do something but instead insulting them. For example not giving someone of a certain race a job is discrimination but if someone followed a person of another race down the street calling them rude names, that’s harassment
You might be interested in
Carl is a music teacher. He builds custom computer systems for his students to use when they are learning and creating music. Ca
shutvik [7]

Answer:

um ahh <em> </em><em>badl</em><em>y</em><em> </em>

Explanation:

i really don't know the answer

4 0
3 years ago
How do you see the recent IT evolution (e.g. platforms, big data, Internet of Things, etc.) affect Internet security and privacy
torisob [31]

Answer:

Answered below

Explanation:

With the evolution and growth of technology, and as we are increasingly having our everyday lives dependent on technology, there arise problems that shouldn't be ignored.

Security of people's personal data and information is of paramount importance. Access to personal information and the sale of these information to companies without the owner's permission is a breach of privacy and one of the challenges we face today.

With the growth of data, there are newer threats and attacks on software security systems to steal these data and therefore there's a need for everyday assessment and improvement in security of data.

3 0
3 years ago
Which type of URL gives an abbreviated path to a resource using the current page as a starting position?
lilavasa [31]

A relative URL is a type of URL that gives an abbreviated path to a resource by using the current webpage as a starting position.

<h3>What is a relative URL?</h3>

A relative URL can be defined as a type of URL that doesn't contain or use the full address of a website, but only the path (location) following the domain name.

This ultimately implies that, a relative URL is a type of URL that gives an abbreviated path (location) to a web resource by using the current webpage as a starting position.

Read more on relative URL here: brainly.com/question/26670945

#SPJ12

6 0
2 years ago
Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and inform
gtnhenbr [62]

Answer:

True

Explanation:

It is TRUE that Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and information security infrastructure elements.

The above statement is true because Internal Monitoring is a term used in defining the process of creating and disseminating the current situation of the organization’s networks, information systems, and information security defenses.

The process of Internal Monitoring involved recording and informing the company's personnel from top to bottom on the issue relating to the company's security, specifically on issues about system parts that deal with the external network.

5 0
3 years ago
What is an example of an Experience component within an enterprise platform?​
Alisiya [41]

Answer:

A

Explanation:

A system used for processing customer payments. A tool used to coordinate recruitment of new employees. A mobile app used by customers to place orders.

6 0
3 years ago
Other questions:
  • Your boss bought a new printer with a USB 3.0 port, and it came with a USB 3.0 cable. Your boss asks you: Will the printer work
    14·1 answer
  • What kind of device is a cpu input or output?
    15·1 answer
  • You accidentally find someone's password and use it to get into a system. this is hacking.
    15·1 answer
  • Whats the relationship between the CPU and motherboard
    6·1 answer
  • 4. Write an appropriate comment for describ-
    11·1 answer
  • Which of the following statements describes a good reason to use lossless audio compression?
    6·1 answer
  • Options to open,save,and print a document are found on which of the following tabs? A.File B.Home C. Design D. Layout
    5·2 answers
  • What word describes a violation of copyright laws? What rights do copyright holders have over their work of art
    5·2 answers
  • A business needs to open at the right ___________ and the right ______________. Choose all correct answers.
    9·1 answer
  • Colorful bead bracelet in codehs
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!