1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
3 years ago
5

Mike humiliates a former friend by posting embarrassing photos on social media. Which ethical standard did he violate?

Computers and Technology
1 answer:
juin [17]3 years ago
6 0

Answer:

this is ethical behavior and could invade on Mike's privacy, if he did not give the former friend the rights to post that photo online

Explanation:

You might be interested in
A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve
mario62 [17]

Answer: (D) IPCONFIG

Explanation:

The IPCONFIG is the type of tool that can be use to flush or refresh the dynamic host configuration (DNS) cache on the window client. The IPCONFIG display various types of parameters such as subnet mask, IP address and the default gateway.

 In the computing, the IPCONFIG is stand for the internet protocol configuration and it is one of the operating system applications which basically display all Transmission control protocol/ Internet protocol (TCP/IP) network configurations.

Therefore,Option (D) is correct.

 

3 0
3 years ago
_____ is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it
babymother [125]

Answer:

Case-based reasoning.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Case-based reasoning is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it. It is typically based on cognitive science and artificial intelligence.

7 0
3 years ago
When comparison shopping, all of these hint at a good deal EXCEPT_____________________.
pav-90 [236]

Answer:

lower-priced models offer more features

Explanation:

4 0
3 years ago
write a 2d array c program that can capture marks of 15 students and display the maximum mark, the sum and average​
bekas [8.4K]

Answer:

#include <stdio.h>  

int MaxMark(int* arr, int size) {

   int maxMark = 0;

   if (size > 0) {

       maxMark = arr[0];

   }

   for (int i = 0; i < size; i++) {

       if (arr[i] > maxMark) {

           maxMark = arr[i];

       }

   }

   return maxMark;

}

int SumMarks(int* arr, int size) {

   int sum = 0;

   for (int i = 0; i < size; i++) {

       sum += arr[i];

   }

   return sum;

}

float AvgMark(int* arr, int size) {

   int sum = SumMarks(arr, size);

   return (float)sum / size;

}

int main()

{

   int student0[] = { 7, 5, 6, 9 };

   int student1[] = { 3, 7, 7 };

   int student2[] = { 2, 8, 6, 1, 6 };

   int* marks[] = { student0, student1, student2 };

   int nrMarks[] = { 4, 3, 5 };

   int nrStudents = sizeof(marks) / sizeof(marks[0]);

   for (int student = 0; student < nrStudents; student++) {              

       printf("Student %d: max=%d, sum=%d, avg=%.1f\n",  

           student,

           MaxMark(marks[student], nrMarks[student]),

           SumMarks(marks[student], nrMarks[student]),

           AvgMark(marks[student], nrMarks[student]));

   }

   return 0;

}

Explanation:

Here is an example using a jagged array. Extend it to 15 students yourself. One weak spot is counting the number of marks, you have to keep it in sync with the array size. This is always a problem in C and would better be solved with a more dynamic data structure.

If you need the marks to be float, you can change the types.

3 0
3 years ago
Difference between ram and rom​
BigorU [14]

Answer:

<h2> RAM</h2>
  • <em>It</em><em> </em><em> </em><em>stands</em><em> </em><em>for</em><em> </em><em>Random</em><em> </em><em>Access</em><em> </em><em>memory</em><em>.</em>
  • <em>It</em><em> </em><em>is</em><em> </em><em>used</em><em> </em><em>for</em><em> </em><em>both</em><em> </em><em>purpose</em><em>(</em><em> </em><em>read</em><em> </em><em>and</em><em> </em><em>write</em><em>)</em><em>.</em>
  • <em>It</em><em> </em><em>is</em><em> </em><em>volati</em><em>le</em><em> </em><em>memory</em><em>.</em>
<h2><em>R</em><em>O</em><em>M</em></h2>
  • <em>It</em><em> </em><em>stands</em><em> </em><em>for</em><em> </em><em>Read</em><em> </em><em>only</em><em> </em><em>memory</em><em>.</em>
  • <em>It</em><em> </em><em>can</em><em> </em><em>be</em><em> </em><em>used</em><em> </em><em>only</em><em> </em><em>to</em><em> </em><em>perform </em><em>the</em><em> </em><em>read</em><em> </em><em>oper</em><em>ation</em><em>.</em>
  • <em>It</em><em> </em><em>is</em><em> </em><em>non-volatile</em><em>.</em>

<em>Hope</em><em> </em><em>this</em><em> </em><em>helps</em><em>.</em><em>.</em><em>.</em>

<em>Good</em><em> </em><em>luck</em><em> on</em><em> your</em><em> assignment</em><em>.</em><em>.</em><em>.</em>

8 0
3 years ago
Read 2 more answers
Other questions:
  • Why is it important to evaluate the website on which you plan to shop?
    11·2 answers
  • What is created for each user the first time the user logs onto windows?
    7·1 answer
  • During which geologic era was nearly all of Earth's land concentrated into one giant mass called Pangaea?
    6·1 answer
  • Based on the screenshot below which letter do you select to sort the items in an alphabetical order?
    9·1 answer
  • PLEASE HELP AND FAST!!!!!<br>Which of the following devices uses binary code?
    6·2 answers
  • Please I need help.
    12·1 answer
  • What facilitates the automation and management of business processes and controls the movement of work through the business proc
    9·1 answer
  • Buying a home security system is an example of protecting your home against________.
    5·1 answer
  • Help me pls...
    7·2 answers
  • You defined a shoe data type and created an instance.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!