1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
r-ruslan [8.4K]
3 years ago
11

Employee X receives phone calls from his boss during dinner.

Computers and Technology
2 answers:
Novay_Z [31]3 years ago
8 0

Answer:

Because his boss is not fair

Explanation:

emmasim [6.3K]3 years ago
7 0

Answer:

It is Because His boos is not fair

Explanation:

Plain and simple his boos does not make fair decisions please make me brainliest i need it

You might be interested in
Recall the binary search algorithm.1. Using the algorithm/algorithmic environment, give pseudocode using a for loop.AnswerMy alg
faust18 [17]

Answer:

Following are the Pseudo Code to the given question:

Explanation:

Following are the pseudo-code by using the For loop:

Defines the A function (node, element)

The node is larger than 0.

if another value of the node equals its element

Loop Break

That element if node. value becomes lower than that

Node is node equivalent.

right

Using other nodes is node equivalent.

 left

Node Return

If the node is vacant

print the Tree is empty

Following are the pseudo-code by using the while loop:

Defines the function A(node,element)

While this node is not zero.

if the value of the node equals the element

Loop Break

The element if node. value is lower than

Node is node equivalent.

right

Using other nodes is equivalent to an a.left node

Node Return

If the node is vacant

print Tree is empty

following are the Pseudo-code for recursion:

Set the function A (node, key)

If no root is the same as the root or no root.

return the root.

If the root value is lower than that of the quest for key return (root. right, key)

Return your lookup (root.left,key)

 

5 0
3 years ago
To build a framework for security policies and controls, one can use the following approach: 1) document the concepts and princi
serious [3.7K]

Answer:

n/a

Explanation:

4 0
3 years ago
A large computer software firm promised a client that it could deliver a new operating system on a tight deadline and put Keith
daser333 [38]

Answer:

The correct option is b. He is a good communicator , he is a motivator, he can keep a secret and lastly he can quickly learn about operating systems.

Explanation:

Based on the information given what best explains why Keith was in charge of the project and was qualified for such a position was that he has a great Communication skills because he communicate and relate with customers in a great ways and he is a good listener.

Secondly he posses confidentiality skills which is a very important skills for a business or an organization.

Lastly he his a fast learner who has the ability to quickly learn and know about everything that has to do with an operating system which is the reason why he was qualified to be in such position and was put in charge of the project based on all the important skills mentioned above that he possess.

5 0
3 years ago
Read 2 more answers
Write a function definition for a function which takes one parameter and returns twice that parameter
dezoksy [38]

Answer:

The function in python is as follows:

def twice(num):

   return 2 * num

Explanation:

This defines the function; The function receives num as its parameter

def twice(num):

This returns twice of num

   return 2 * num

8 0
3 years ago
In which country did the World Cyber Games originate?
levacccp [35]
The world cyber games originated in South Korea.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Give a big-O estimate for the number of comparisons used by the algorithm that determines the number of 1s in a bit string of le
    9·2 answers
  • Signs that a listener is paying attention include:
    10·2 answers
  • Which of these statements about symmetric key encryption is true? The file is encrypted with a private key and can be decrypted
    14·1 answer
  • 2- (8 point) Write a program using the instructions below. Assume that integers are stored in 4 bytes. a) Define an array of typ
    10·1 answer
  • Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I
    12·1 answer
  • Which of the following BEST describes Computer Science (CS)?
    8·1 answer
  • A sum of money is shared between 2 friends in the ratio 2 : 3. If the larger
    9·1 answer
  • QUESTION 2
    9·1 answer
  • Which company introduce the first Minicomputer in 1960.​
    8·2 answers
  • Help me code game plz just comment below for more info
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!