1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crazy boy [7]
2 years ago
14

Which of the following ethical guidelines is best described as refraining from using granted authorizations for personal gain or

activities that are not appropriate in the workplace?
Do not use computer access or the Internet for unprofessional or inappropriate purposes.

Protect system access of users.

Do no harm to a company when leaving.

Be fair and honest with customers.
Computers and Technology
1 answer:
Artyom0805 [142]2 years ago
7 0

Answer:

A. Do not use computer access or the Internet for unprofessional or inappropriate purposes.

You might be interested in
Identify the equation that translates Y = In(x) five units down.​
Tatiana [17]
Y=In(x)-5
hopefully it’s right :)
4 0
2 years ago
A file name extension provides what information about a file?
ASHA 777 [7]
In a file extension, it tells what type of file it is and tells what compiler to run the code.
8 0
3 years ago
Read 2 more answers
Which of the following is true of the Internet as a medium for branding? a) The Internet is more effective as a media for brandi
alexira [117]

Answer:

The answer to this question is option "d".

Explanation:

Internet branding describes as a brand management system that allows us to use the Internet as a tool for promoting the products. In other words, we can say that advertising the product on the Internet is known as Digital marketing. and other options are not correct that can be defined as:

  • In option a, It does not provide one-directional communication flow.
  • The b, c, and e options are not correct, because the internet is an effective medium for branding and it also provides services for branding.  

3 0
2 years ago
An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul
WINSTONCH [101]

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

8 0
3 years ago
HELP ASAP DONT ANSWER WITH A LINK​
OlgaM077 [116]

Answer:

<u>Layout</u>

title

title and content

section header

comparison

<u>Orientatio</u><u>n</u>

landscape

portrait

8 0
2 years ago
Other questions:
  • When you perform an in-place upgrade to windows 8.1 from windows 7, what will be names of the “windows” folders in windows 7 and
    5·1 answer
  • In python,_______ are used to define the conditions necessary for a while loop to run.
    7·2 answers
  • Please help I really need it
    7·1 answer
  • If the supply of computer engineers increases at the same time that the demand for these workers decreases, what would be the MO
    7·1 answer
  • State the functions of all the parts of the computer​
    14·1 answer
  • Select the correct answer.
    8·2 answers
  • Resumen sobre Tailandia​
    10·1 answer
  • 5. In what ways is the human brain like a computer? In what ways is it different?
    15·2 answers
  • What is a key differentiator for Accenture when delivering Artificial Intelligence (AI) solutions to clients?
    11·1 answer
  • Which can be used to create a poll on a web page? <br>CSS<br>HTML <br>JavaScript <br>Text editor​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!