1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pentagon [3]
3 years ago
10

What does a code of conduct include.

Computers and Technology
2 answers:
anygoal [31]3 years ago
8 0
A code of conduct includes rules and responsibilities for the individual or party
kvv77 [185]3 years ago
3 0
It is a guild line I think for coding.
You might be interested in
PLZZ HELP!! ITS FOR A TEST!! Third generation computers were set apart because of this invention. A) microprocessors B) transist
Vladimir [108]

Answer:

A. Invention of microprocessor

Explanation:

The third generation of computer itself was based on the technology of integrated circuits (shorten as IC).

It lasted for about 6 years and was brought to an end with the advent of the fourth generation of computers which was based on microprocessors.

Hence, option A answers the question.

4 0
3 years ago
Read 2 more answers
PLS CAN ANYONE HELP ME
Nesterboy [21]

The exercise contains 15 questions. The solution is provided for each question.

Each question contains the necessary skills you need to learn.

I have added tips and required learning resources for each question, which helps you solve the exercise. When you complete each question, you get more familiar with a control structure, loops, string, and list.

Use Online Code Editor to solve exercise questions.

Also, try to solve the basic Python Quiz for beginners

Exercise 1: Given two integer numbers return their product. If the product is greater than 1000, then return their sum

Reference article for help:

Accept user input in Python

Calculate an Average in Python

Given 1:

number1 = 20

number2 = 30

Expected Output:

The result is 600

Given 2:

number1 = 40

number2 = 30

Expected Output:

The result is 70

Explanation:

4 0
3 years ago
The point of (18 ,0) lies on​
zysi [14]
This point lies on the x value
4 0
3 years ago
Read 2 more answers
In a penetration test, the ________ team comprises testers who are given no knowledge of the infrastructure and are attacking a
just olya [345]

Answer:

TIGER TEAM

Explanation:

Penetration testing is the act of simulating an attack on an organization's resources to assess an infrastructure's true vulnerabilities. A penetration test simulates an actual attack. Penetration testers use a variety of methods including social engineering, software hacking and physical intrusion.

There are different types of penetration testing teams which are: red team, blue team and purple team.

Red team also known as the tiger team simulates real types of cyber attacks in order to discover any unknown security vulnerabilities or weaknesses.

In penetration testing, tiger (red) team are the attackers and are usually outside contractors, with a lot of knowledge of how to break in but NO KNOWLEDGE OF WHAT SECURITY IS IN PLACE.

Therefore, In a penetration test, the TIGER TEAM comprises testers who are given no knowledge of the infrastructure and are attacking a target that is unaware of their existence until the attack is made.

3 0
3 years ago
Write a program that accepts two integers from the user and perform one of the four arithmetic operations based on user’s choice
alex41 [277]

Answer:

do you still need the answer? or am i to lateeee

Explanation:

6 0
3 years ago
Other questions:
  • Use your own words to describe how IT/IS can support major functional areas in the business. Discuss at least two of these areas
    14·1 answer
  • What part of a file name does windows use to know which application to open to manage the file?
    13·2 answers
  • The ____ button resets slide placeholders to their default position, size, and text formatting.
    11·1 answer
  • Can you please answer these questions for me: Is it illegal to copyright? What does it mean to get copyrighted? What are example
    12·2 answers
  • Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
    11·1 answer
  • You can't get close enough to the facility interior to launch an evil twin attack against its wireless clients; in fact, you hav
    11·1 answer
  • Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate serv
    11·1 answer
  • The three Fs of product design are form, fit and
    7·2 answers
  • I dont know how to put the negative sigh on my computer
    5·2 answers
  • Binary subtraction<br> Subtract (111) from (1000)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!