1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pantera1 [17]
3 years ago
14

Select the correct answer from each drop-down menu. A company is recruiting for a web designer. What kind of candidate should th

e company recruit so that they can complete the tasks resourcefully? To complete the task resourcefully, the company should recruit the candidate who would at least possess a BLANK in technical subject and should know designing languages like BLANK 1. A. masters degree B. bachelors degree C. associates degree 2. A.HTML5 and CSS3 B.Azure and Balsamiq C.Sybase and ruby​
Computers and Technology
2 answers:
prisoha [69]3 years ago
8 0

Answer:a

Explanation:

gavmur [86]3 years ago
6 0

Answer: B

Explanation:

You might be interested in
identify at least three additional ethical responsibilities expected from a computer professional. In brief, explain each respon
kompoz [17]

The ethical responsibilities for computer professionals are:

Respect Confidentiality.

Maintain professional competence.

Respects and protection of personal privacy.

Explanation:

  • Computer professionals are expected to conduct themselves in an ethical manner.
  • Codes of ethics exist in this field to help these professionals make good decisions about the manner of their professional work.
  • A computer professional must strive to provide the highest quality of work possible by acquiring and maintaining professional competence. He should be knowledgeable in the laws pertaining to his profession and not violate them.
  1. Respect Confidentiality : Confidentiality refers to protecting information from being accessed by unauthorized parties. Only the people who are authorized to do so can gain access to sensitive data. All the security incidents reported in the media today involve major losses of confidentiality.
  2. Maintain professional competence : The capability to perform the duties of one's profession generally, or to perform a particular professional task, with skill of an acceptable quality. Maintaining professional competence allows individuals to learn throughout their career, to develop technical skills, and to keep pace with accountancy changes.
  3. Respects and protection of personal privacy : Privacy computing includes all computing operations by information owners, collectors, publishers, and users during the entire life-cycle of private information, from data generation, sensing, publishing, and dissemination, to data storage, processing, usage, and destruction.

8 0
4 years ago
What is the most popular social networking service to date?
Fofino [41]
I think Face book hope that helped XD
6 0
3 years ago
Read 2 more answers
Why is it pointless to expect cyberattackers to follow organizational legal measures?
WITCHER [35]

Answer:

The answer is A.

5 0
3 years ago
Why do attackers tend to target public or private Wi-fi networks?<br><br><br> I’ll mark as brainiest
Assoli18 [71]

Answer:

Explanation:

bc they're easier to crack

6 0
3 years ago
Read 2 more answers
A _______ is smaller than a notebook or laptop and has a touchscreen and sometimes a pointing device.
inysia [295]
Tablet (such as iPad, surface), smart phone (such as iphone7 plus and samsung S8)
6 0
4 years ago
Other questions:
  • On the CallCenterReport worksheet, add formulas that will summarize the issues for the department entered in cell B3. In cell B6
    13·1 answer
  • Are video games considered information technology
    9·2 answers
  • Think back over the information presented in the lesson about how you can skillfully use the Internet when doing research. Selec
    14·1 answer
  • Pick the JavaScript code for the following pseudocode. If age &gt;= 65 Then discountRate = 0.10 End If Group of answer choices
    12·1 answer
  • Do you think cyber-bulling is more damaging, as damaging, or less damaging than in-person bullying? Why?
    11·2 answers
  • You are to write a program name matrix.java that multiplies two matrices. 1. Your program should prompt the user for the dimensi
    5·1 answer
  • A ____ is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, proc
    11·1 answer
  • PYTHON
    8·1 answer
  • How would our lives be different without computers at home?
    6·1 answer
  • What does computer graphics mean?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!