1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
2 years ago
7

Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional

or inappropriate way?

Computers and Technology
1 answer:
pantera1 [17]2 years ago
6 0

Answer:

All of the above

Explanation:

You might be interested in
(Financial application: compound value) Suppose you save $100 each month into a savings account with the annual interest rate 5%
allochka39001 [22]

Answer:

Follow the code or function below...

Do not forget the saving amount, and initialise the balance with that amount. Inside the loop, work out and add the interest and then add the saving amount for the next month.

Explanation:

inicial = float(eval(input('Enter the montly saving amount: ')))

x = (1 + 0.00417)

month_one = inicial * x

month_two = (inicial + month_one) * x

month_three = (inicial + month_two) * x

month_four = (inicial + month_three) * x

month_five = (inicial + month_four) * x

month_six = (inicial + month_five) * x

print('The sixth month value is: '+str(month_six))

Don't forget the saving amount, and initialise the balance with that amount. Inside the loop, work out and add the interest and then add the saving amount for the next month.

balance = 801

for month in range(6):

   balance = balance * (1.00417)

print(balance)

7 0
3 years ago
Why is there a need to compare and align one's PECs of a successful entrepreneur?
gulaghasi [49]
There is a need to compare and align one's PEC to that of a successful entrepreneur because doing so help ensure success in one chosen career. PEC refers to Personal Entrepreneurial Competencies, which are the important characteristics that one has to possess in order to be a successful entrepreneur. 
4 0
3 years ago
Computer hardware without software is useless while computer software without hardware is meaningless. Discuss. Plz provide exam
posledela
The Software is categorized into two. Operating System Software and the Application software.
Example :
1.0 The monitor does not show pictures without the source, when watching a video the source media application 
2.0 The printer does not print on its own without the source data from the office application, print application which process the data.
3.0  The speaker does not produce sound on its own without the source data from the media application as well.
4.0  The central processing units together with the memory does not run without the preinstalled bios and operating software on the computer.

The hardware will not run without the operating software (OS) to connect run each functional part of the computer. The Central Processing Unit computes for the Inputs and Outputs fed to it giving the computer the power to process data coming from all the hardware components receiving the electrical signals translated from the data input from human interaction or other source of data interaction to the computer. To divide we mainly have your hardware components, The Central Processing Unit, The input Peripheral (mouse, keyboard, pen stylus, mics, camera, etc) and your output peripherals (Monitor, Speakers, etc.,). Then we have your software component divided into two. The operating system software (Windows /Mac OS/ Linux / Unix / ) and the application software/program (Office applications, Browser etc.,).

5 0
2 years ago
The producer thread will alternate between sleeping for a random period of time and inserting a random integer into the buffer.
Llana [10]

Answer:

// Producer Thread

void *producer(void *param) {

buffer_item item;

while (true) {

item = rand() % 100;

sem_wait(&empty);

pthread_mutex_lock(&mutex);

if (insert_item(item))

printf("Can't insert item\n");

else

printf("Producer %d: produced %d\n", *((int*)param), item);

pthread_mutex_unlock(&mutex);

sem_post(&full);

}

}

// Consumer Thread

void *consumer(void *param) {

while (true) {

buffer_item item = NULL;

if (in > 0)

item = buffer[in - 1];

sem_wait(&full);

pthread_mutex_lock(&mutex);

if (remove_item(&item))

printf("Can't remove item\n");

else

printf("Consumer %d: consumed %d\n", *((int*)param), item);

pthread_mutex_unlock(&mutex);

sem_post(&empty);

}

}

Explanation:

An outline of the producer and consumer threads appears as shown above.

3 0
3 years ago
When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. B
jeka94

Answer:

Because reusing the old passwords possess security threats.

Explanation:

A password can be defined as a string of characters or words or phrases that are used to authenticate the identity of the user. It is also known as passcode and should be kept confidential. A password is used to access constricted systems, applications, etc.

A password or passcode is usually composed of alphabets, numbers, symbols, characters, alphanumeric, or a combination of these.

<u>In the given case, Judy was not able to change her passcode to the previous one because reusing old passwords is prohibited in any sites or systems. A system denies the user to reuse the old passwords for various reasons but most importantly due to security reasons. Though it is said that old passwords can be used after 100 times but seldom someone changes a password that much. All systems care for the security of their users thus they deny reusing old passcodes.</u>

6 0
3 years ago
Other questions:
  • How do you design video games
    5·1 answer
  • a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style
    6·1 answer
  • How do you measure objects and re-size them in tinkercad? I need it in steps.
    7·1 answer
  • Microsoft ________ is a cloud storage and file sharing service
    12·1 answer
  • Controlling access of information on the internet
    15·1 answer
  • A business would use a website analytics tool for all of the following EXCEPT _____.
    9·1 answer
  • PYTHON HW PLEASE HELP. I NEED THE ACTUAL CODE!!! 100 POINTS AND BRAINLIEST. REPORTING IF YOU DON'T ANSWER
    11·1 answer
  • A user generates printouts consisting of several pages of seemingly random characters every time he prints to a network printer.
    5·1 answer
  • Record the issue of 4,000 shares of $5 par value common stock for $35000 cash
    5·1 answer
  • Create a program that prompts the user for a positive integer then prints a right-aligned pyramid using that number using the st
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!