1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crazy boy [7]
2 years ago
14

Which of the following ethical guidelines is best described as refraining from using granted authorizations for personal gain or

activities that are not appropriate in the workplace?
Do not use computer access or the Internet for unprofessional or inappropriate purposes.

Protect system access of users.

Do no harm to a company when leaving.

Be fair and honest with customers.
Computers and Technology
1 answer:
Artyom0805 [142]2 years ago
7 0

Answer:

A. Do not use computer access or the Internet for unprofessional or inappropriate purposes.

You might be interested in
9. What is the difference between a hand-drawn sketch, a working drawing, and a 3D model?
jarptica [38.1K]
A hand draw sketch is drawing with just a pencil and paper. Also, a working drawing is a drawing on at a job. The 3D sketch is on the computer.

3 0
3 years ago
Suppose that we pick the following three tuples from a legal instance of a relation S (S has 100 tuples in total). Relation S ha
AysviL [449]

Answer:

The correct answer is BC → A, A does not hold over S. we noticed the tuples (1 ,2 ,3 ) and (4 ,2 ,3) which can hold over S)

Explanation:

Solution

No, since in this case the instance of S is provided. so such particular dependencies are unable to breach through such instance, but unable to tell which the dependencies hold towards S.

A functional dependency holds towards only when a relation forms a statement regarding the complete allowed instances of relation.

8 0
3 years ago
Match each vocabulary word to its definition.
Nana76 [90]

Answer:

Column matching given in explanation

1. Intranet :  <em>a network of computer within an organization</em>

2. Placeholder: <em>an empty area that reserves space for new content</em>

3. Presentation: <em>information delivered to an  audience</em>

4: Presentation Technology:  <em>a software application that helps  organize and convey information</em>

5. Keynote:   <em>the main speech delivered to all in attendance</em>

Explanation:

Intranet:

A small network that exist in the small organization or company to connect all the computers in organization.

Placeholder:

In computer programming, few variables has been defined in the start of program. These variables have no value initially but can be utilized at the time of need. These variable holds some space in memory that is called Placeholder.

Presentation:

A piece of information relevant to some particular topic, which will be delivered to a particular audience is called presentation.

Presentation Technology:

The tools that are used to assist presentation such as projector, slides, boards etc. are called presentation technology.

Keynote:

The main idea of speech that presenter want to deliver to the audience is called Keynote.

4 0
2 years ago
A data flow cannot go directly back to the same process it leaves. There must be at least ________ other process(es) that handle
Flauer [41]

Answer:

Answer is A. One.

Refer below.

Explanation:

A data flow cannot go directly back to the same process it leaves. There must be at least one other process that handle(s) the data flow, produce(s) some other data flow, and return(s) the original data flow to the beginning process.

3 0
3 years ago
Shannon wants to work with renewable energy. She is researching what it would take to become a geochemist. A geochemist is someo
Liula [17]

Answer:

Critical thinking

Explanation:

Shannon needs to be a Critical thinker to be effective in this position. Critical thinking has to do with giving deep and good thoughts while doing analysis, or assessment in other to come up with good judgements about a subject or topic.

Since she is going to be studying water and elements in it, she would be doing a lot of analysis and assessments and In other to do good in her field she must learn to think critically before arriving at her conclusions.

3 0
3 years ago
Other questions:
  • Each computer or device on a network is called a(n) ______.
    7·1 answer
  • One of the attributes in a table in your database depends on another attribute for its meaning. What type of dependency has been
    14·1 answer
  • Match each task with the features necessary to complete the task
    10·1 answer
  • How did the invention of the printing press lead eventually to an increase in the diversity of religious expression?
    7·1 answer
  • What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sen
    11·1 answer
  • How do you change your name on brainly after you have made an account​
    5·1 answer
  • If a salesperson were trying to sell this cabin, which word would be best to use to make its size seem most positive?
    7·2 answers
  • Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a cowor
    7·1 answer
  • which of the following devices and and receive information from other device? a parallel port B serial port C video port d both
    8·1 answer
  • Which is true for comments? Group of answer choices The compiler does not generate machine code for comments. The compiler conve
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!