1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scorpion4ik [409]
3 years ago
13

Colleen has been missing a lot of work. She often calls in right as her shift is starting with some excuse about why she

Computers and Technology
2 answers:
Annette [7]3 years ago
7 0

Answer:

I would say honesty or dependability but most likely dependability since you cant rely on her to come to work on time and she's always making excuses

Explanation:

yanalaym [24]3 years ago
5 0
She is not showing honesty
You might be interested in
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
3 years ago
Anwser the question below plz due in 15 mins.
klemol [59]
Novels about Harry Potter, a boy who learns on his eleventh birthday that he is the orphaned son of two powerful wizards and possesses unique magical powers of his own. He is summoned from his life as an unwanted child to become a student … More
Releas
6 0
3 years ago
What is the major problem with using pneumatics for robots, and how do we correct it?
Pepsi [2]
Well m<span>ost pneumatic system issues are caused by attempts to make a cylinder and related compressed air system components do something outside of the hardware’s design parameters. In order to fix this, use a filter regulator, do not oversize the cylinder, also ensure proper plant supply pressure, make sure you are using a manual, lockable air dump valve as well.
Hope this helps!</span>
4 0
3 years ago
List the six external parts of a computer system and identify which are output and which are input devices.
Igoryamba
External hardware/peripherals are external devices connected to a computer that extend it's functionality. Some common ones are:

1. Monitor - output
2. Keyboard - input 
3. Speakers - output
4. Printer - output
5. Microphone - input
6. Mouse - input

Input is anything that's used to feed/put data into a computer. So for a keyboard that's which keys you're pressing, microphone that's sound data etc. Output is a<span>ny </span>computer<span>-generated data displayed on screen, printed on paper or in machine readable form, such as a disk.</span>
<span />
5 0
3 years ago
If you don’t have a paper copy of the FAFSA form, how else can you fill it out?
Ronch [10]
Go on your school computer, and find a copy of the form. Then print it from the school printer.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which destination ip address is used when an ipv6 host sends a dhcpv6 solicit message to locate a dhcpv6 server?
    15·1 answer
  • Select the correct statement below. Group of answer choices
    6·2 answers
  • Variables set equal to patterns are said to be:_______.
    7·1 answer
  • This software system shall consist of four source files (.cpp) and four header files (.h) defining four classes. The first class
    6·1 answer
  • Help please, it would be much appreciated!
    11·1 answer
  • All computer systems have
    14·2 answers
  • Write an algorithm for a program which inputs the lengths a, b and c of the three sides of a triangle. The program then determin
    9·1 answer
  • Service-oriented architecture includes "reuse." Which of the following is a description of why a business finds it useful? Using
    7·1 answer
  • What's the differences between jojoy and moddroid???
    10·1 answer
  • Which protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!