It might not seem as if these questions have much to do with your future self as a professional, but theydo. Being ethical online is as important to future employers as being ethical in the workplace. Knowingwhat is ethical and thinking about how to handle these situations will affect the way you handle dilemmasthat come up in the professional world. Online behavior is also one way you shape yourself as a personof integrity. Remember,integrityis the quality of being honest and having strong moral principles. Thedigital realm is a very important arena for exercising integrity
Future employers place equal value on online ethics as they do on ethics in the office. You'll be able to handle ethical difficulties that arise in the workplace better if you are aware of them and consider how to approach them.
What are ethics?Ethics are defined as a subfield of philosophy that "systematizes, defends, and counsels conceptions of right and wrong behavior." The Fundamental Ethics Principles. The four ethical tenets are beneficence, nonmaleficence, autonomy, and justice. In order to tell the truth, maintain our word, or assist a stranger in need, we must follow ethical principles.
One method to develop yourself as a person of integrity is through your online behavior. Keep in mind that having integrity means being trustworthy and adhering to high moral standards. The internet world is a crucial space for upholding integrity.
Thus, future employers place equal value on online ethics as they do on ethics in the office. You'll be able to handle ethical difficulties that arise in the workplace better if you are aware of them and consider how to approach them.
To learn more about ethics, refer to the link below:
https://brainly.com/question/11992384
#SPJ2
Order the steps for accessing the junk email options in outlook 2016
Answer:
1 Select a message
2 Locate the delete group on the ribbon
3 Click the junk button
4 Select junk email options
5 Choose one of the protection levels
Explanation:
Correct on Edg 2021
Answer:
In this Order:
Select Message, Locate delete group, click the junk, choose one of the...
Explanation:
Edg 2021 just took test
Which of the following tasks can you perform using a word processor?
insert a bulleted list in a document
check a document for spelling errors
edit a video for inclusion in a document
create an outline of sections to be included in a document
set a password to restrict access to a document
The following task can you perform using a word processor is creating an outline of sections to be included in a document. The correct option is c.
What is a word processor?A word processor is a computer program or device that provides for input, editing, formatting, and output of text, often with additional features.
Simply put, the probability is the likelihood that something will occur. When we don't know how an event will turn out, we can discuss the likelihood or likelihood of several outcomes.
Statistics is the study of events that follow a probability distribution. In uniform probability distributions, the chances of each potential result occurring or not occurring are equal.
Therefore, the correct option is c. create an outline of sections to be included in a document.
To learn more about word processors, refer to the link:
https://brainly.com/question/14103516
#SPJ5
Write a for loop that reads an integer from the user, and prints the sum of numbers from 1 to that integer (inclusive). If the user enters a number less than 1, he/she should be prompted to enter a number greater or equal to 1.
Answer:
Written in Python
num = int(input("Number: "))
while num < 1:
num = int(input("Number: "))
total = 0
for i in range(1, num+1):
total= total + i
print("Total: "+str(total))
Explanation:
This line prompts user for input
num = int(input("Number: "))
The following iteration checks and prompts user for valid input
while num < 1:
num = int(input("Number: "))
This initializes total to 0
total = 0
The following iteration adds from 1 to input number
for i in range(1, num+1):
total= total + i
This displays the total
print("Total: "+str(total))
Assume you are using an array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements, dequeue 5 elements, and then enqueue 1 more element. Which index of the internal array elements holds the value of that last element you enqueued
Answer:
The answer is "5".
Explanation:
In the queue based-array, it follows the FIFO method, and in the question, it is declared that a queue has a capacity of 10 elements, and insert the 5 elements in the queue and after inserting it enqueue 5 elements and at the last, it inserts an element 1 more element on the queue and indexing of array always start from 0, that's why its last element index value is 5.
Network in which every computer is capable of playing the role of the client, server or both at the same time is called *
local area network
dedicated server network
peer-to-peer
wide area network
Answer:
peer to peer
Explanation:
Here, we want to select which of the options best answer the question.
The answer is peer to peer
The peer to peer network configuration is a type in which each computer can work as a client, a server or both
Thus , in a peer to peer network configuration, we can have the computer systems on this network having the possibility of working as either the client, the server or both of them simultaneously
Write a function add_spaces(s) that takes an arbitrary string s as input and uses a loop to form and return the string formed by adding a space between each pair of adjacent characters in the string. You may assume that s is not empty.
Solution:
def add_spaces(s):
result = ""
for i in range(len(s)-1):
result += (s[i]+" ")
result += s[-1]
return result
# Testing
print(add_spaces('hello'))
print(add_spaces('hangman'))
print(add_spaces('x'))
And the output will be
hello
hangman
x
Process finished with exit code 0
Write a method called min that takes three integers as parameters and returns the smallest of the three values, such that a call of min(3, -2, 7) would return -2, and a call of min(19, 27, 6) would return 6. Use Math.min to write your solution.
Answer:
public class Main
{
public static void main(String[] args) {
System.out.println(min(3, -2, 7));
}
public static int min(int n1, int n2, int n3){
int smallest = Math.min(Math.min(n1, n2), n3);
return smallest;
}
}
Explanation:
*The code is in Java.
Create a method named min that takes three parameters, n1, n2, and n3
Inside the method:
Call the method Math.min() to find the smallest among n1 and n2. Then, pass the result of this method to Math.min() again with n3 to find the min among three of them and return it. Note that Math.min() returns the smallest number among two parameters.
In the main:
Call the method with parameters given in the example and print the result
Methods are named program statements that are executed when called/invoked.
The method in Python, where comments are used to explain each line is as follows:
#This defines the method
def mmin(a,b,c):
#This calculates the smallest of the three values using math.min
minNum = min(a,b,c)
#This prints the smallest value
return minNum
Read more about methods at:
https://brainly.com/question/14284563
The SQL SELECT command is capable of executing ____.
a. only relational Select operations
b. only relational Select and Project operations but not relational Join operations
c. relational Select, Project, and Join operations individually but not in combination
d. relational Select, Project, and Join operations individually or in combination
e. None of the above.
Answer:
d. relational Select, Project, and Join operations individually or in combination
Explanation:
SQL is short for structured query language. The SQL Select command allows the user to obtain data from a database. After the data is computed, the output is in a tabular form which is known as the result set.
All the queries begin with the Select command. The column and the table names are clearly noted in the instructions. This command can also execute projects and join several operations in combination or individually.
A nutritionist who works for a fitness club helps members by evaluating their diets. As part of her evaluation, she asks members for the number of fat grams and carbohydrate grams that they consumed in a day. Then, she calculates the number of calories that result from the fat, using the following formula: calories from fat = fat grams X 9 Next, she calculates the number of calories that result from the carbohydrates, using the following formula: calories from carbs = carb grams X 4 The nutritionist asks you to write a program that will make these calculations.
In python:
fat = int(input("Enter the # of fat grams: "))
carbs = int(input("Enter the # of carbohydrate grams: "))
print("The calories from fat are {} and the calories from carbs is {}".format(fat * 9, carbs * 4))
What are the disadvantages of batch operation system
The computer operators should be well known with batch systems.
Batch systems are hard to debug.
It is sometime costly.
The other jobs will have to wait for an unknown time if any job fails.
Explanation:
Answer:
Disadvantages of Batch Operating System:
The computer operators should be well known with batch systems.Batch systems are hard to debug.It is sometime costly.The other jobs will have to wait for an unknown time if any job fails.Write a function that takes as input two parameters: The first parameter is a positive integer representing a base that is guaranteed to be greater than 1. The second parameter is an integer representing a limit. The function should return a list containing all of the non-negative powers of the base less than the limit (not including the limit). The powers should start at base^0=1 and increase from there until the limit. If the limit is less than 1 the functions should just return an empty list
Answer:
Written in Python:
def powerss(base, limit):
outputlist = []
i = 1
output = base ** i
while limit >= output:
outputlist.append(output)
i = i + 1
output = base ** i
return(outputlist)
Explanation:
This declares the function
def powerss(base, limit):
This creates an empty list for the output list
outputlist = []
This initializes a counter variable i to 1
i = 0
This calculates base^0
output = base ** i
The following iteration checks if limit has not be reached
while limit >= output:
This appends items to the list
outputlist.append(output)
The counter i is increased here
i = i + 1
This calculates elements of the list
output = base ** i
This returns the output list
return(outputlist)
Which of the following is true about strings?
They cannot be stored to a variable
An input (unless otherwise specified) will be stored as a string
They do not let the user type in letters, numbers and words
They are used for arithmetic calculations
Answer:
Your answer is option C, or the third option.
They do not let the user type in letters, numbers, and words.
Explanation:
Strings are defined as a sequence of characters literal, constant, or variable. These sequences are like an array of data or list of code that represents a structure. Formally in a language, this includes a finite(limited) set of symbols derived from an alphabet. These characters are generallu given a maximum of one byte of data each character. In longer languages like japanese, chinese, or korean, they exceed the 256 character limit of an 8 bit byte per character encoding because of the complexity of the logogram(character representing a morpheme((which is the simpliest morphological(form or structure) unit of language with meaning)) character with 8 bit (1 byte, these are units of data) refers to cpu(central processing unit) which is the main part of a computer that processes instructions, and sends signals.
Use the drop-down menu to put the four steps of effective time management in order.
1. Complete the
.
2. Make the
.
3. Prioritize the
.
4. Establish the
.
Answer:
1. Complete the
✔ study-time survey
.
2. Make the
✔ project schedule
.
3. Prioritize the
✔ tasks
.
4. Establish the
✔ award system
.
Explanation:
brainliest please
The drop-down menu shows effective time management by Completing a study-time survey, making a project schedule, prioritizing tasks, and establishing an award system.
What is effective time management?Time management is a process organizing and managing time by dividing it into various activities and working smarter not harder.
Effective time management is an art as it includes completing study time a survey, making and scheduling the projects on time, prioritizing the tasks and establishing the system.
Find out more information about time management.
brainly.com/question/24662469
The SAP ERP ____ software module plans and schedules production and records actual production activities.A) project systemB) production planningC) quality managementD) asset management
Answer:
A) project system
Explanation:
The SAP ERP is a planning software that incorporates the business function of an organization. The business function are Operations, Financials, Human Capital Management and Corporate Services.
SAP Project System is a tool (functional module) that is integrated with the SAP Enterprise Resource Planning (SAP ERP) system allowing users to direct funds and resources as well as controlling each stage of the project. It also allow users to define start and end date of the project.
Write a program that asks for the names of three runners and the time, in minutes, it took each of them to finish a race. The program should display the names of the runners in the order that they finished.
Answer:
Written in Python
names = []
times = []
for i in range(0,3):
nname = input("Name "+str(i+1)+": ")
names.append(nname)
time = input("Time "+str(i+1)+": ")
times.append(time)
if times[2]>=times[1] and times[2]>=times[0]:
print(names[2]+" "+times[2])
if times[1]>=times[0]:
print(names[1]+" "+times[1])
print(names[0]+" "+times[0])
else:
print(names[0]+" "+times[0])
print(names[1]+" "+times[1])
elif times[1]>=times[2] and times[1]>=times[0]:
print(names[1]+" "+times[1])
if times[2]>times[0]:
print(names[2]+" "+times[2])
print(names[0]+" "+times[0])
else:
print(names[0]+" "+times[0])
print(names[2]+" "+times[2])
else:
print(names[0]+" "+times[0])
if times[2]>times[0]:
print(names[2]+" "+times[2])
print(names[1]+" "+times[1])
else:
print(names[1]+" "+times[1])
print(names[2]+" "+times[2])
Explanation:
I've added the full source code as an attachment where I used comments to explain difficult lines
!!General Chromebook Software Question!!
What types of software applications can a chromebook run?
Answer:
Explanation:
Google???
Answer: are every files compatible with a windows 10 laptop sir
You can use VMware on Chromebooks to run Windows applications, and there's support for Linux software, too. Plus, current models can run Android apps and there are also web apps that are available through Google's Chrome Web Store. Read more: Best laptops, desktops and tablets for designers and creatives in 2020
What does the measurement tell you?
Schedule performance index
Answer:
how close the project is to being completed compared to the schedule/ how far ahead or behind schedule the project is, relative to the overall project
Explanation:
Instagram
Hello everyone hope you are doing well,
I am having this issue where i don’t receive notifications from instagram.
I tried signing in from another device and it workedd
( both phones are ios and same settings)
What should i do to receive notifications?
Please help
Thanks!
hhhhhh You do not need to tell a teacher you have downloaded anything as long as it did not save to your computer.
Please select the best answer from the choices provided
T
F
nyan...
Answer: F
Explanation: Have a Great Day!
Answer:
MATERWELON
Explanation:
what is an instruction set architecture
Answer:
Instruction set architecture is the abstract model of a computer and is the part of the processor that is visible to the programmer or compiler writer
Explanation:
Which of the following best describes open-source code software?
O A. a type of software that is open to the public and can be modified
B. a type of software that is free to download, but cannot be modified
C. a type of software that is locked, but can be modified
D. a type of software that has already been modified
Answer:
A. a type of software that is open to the public and can be modified.
Explanation:
Open-source refers to anything that is released under a license in which the original owner grants others the right to change, use, and distribute the material for any purpose.
Open-source code software is described as a type of software that is open to the public and can be modified. The correct option is A.
What is open-source code?Open-source software is computer software that is distributed under a licence that allows users to use, study, change, and distribute the software and its source code to anyone and for any purpose.
Open-source software can be created collaboratively and publicly. Open-source refers to anything that is released under a licence that allows others to change, use, and distribute the material for any purpose.
Therefore, open-source code software is defined as software that is freely available to the public and can be modified. A is the correct answer.
To know more about open-source code follow
https://brainly.com/question/15039221
#SPJ6
Uncontrolled railroad crossing warning signs include _____
A. round black-on-yellow warning signs.
B. red flashing lights.
C. crossing gates.
D. none of the above
Answer:
letter D
Explanation:
The controlled railroad crossings have red lights and warning signs with railway gates. But if none of those items are present, then it is an uncontrolled railroad crossing.
Uncontrolled railroad crossing warning signs include; D; None of the above
There are two main types of railroad crossings namely;
Controlled railroad crossing warning signs.Uncontrolled railroad crossing warning signs.A Controlled railroad crossing has signs such as warning signs, red lights and railway gates.
However, in uncontrolled railroad crossing, the signs don't include any of the ones listed for controlled railroad crossing signs but instead will have no signs, no signals and no gates.
Looking at the options, A, B and C represent controlled railroad crossing signs and so the correct answer in none represents uncontrolled railroad crossing signs.
Read more about railroad crossings at; https://brainly.com/question/4360017
Aswer asap
Give two importance of hashing
I need help. People who know computer science. I have selected a word from the first 1000 words in my dictionary. Using the binary search algorithm, how many questions do you have to ask me to discover the word I have chosen?
a. 8 b. 10 c. 12 d. 14
Answer:
14
Explanation:
Match the graphic design tool to its purpose/definition.
-Drawing
-Layers
-Magic Wand
-Lasso
a. You can combine several images to
create one image.
b. You can make selections of irregular
shapes.
c. You can draw rectangles, circles,
and other geometric shapes.
d. You can select areas based on
color.
Answer:
You can combine several images to
create one image. -------Layers
You can make selections of irregular
shapes. ----------- Lasso
You can draw rectangles, circles,
and other geometric shapes.-- Drawing
You can select areas based on
color.------Magic Wand
Explanation:
Graphic design software is used to create, edit, and view graphic art. Graphic design software comes in a wide variety of forms, each with a unique set of tools and features.
What graphic design tool, its purpose?These software programs allow graphic designers to produce, edit, store, and manage their creative output, including pictures, images, videos, presentations, brochures, and other visual forms.
They can be installed to run from a desktop computer or provided as a cloud-based service. Users can format layouts, generate multimedia, stylize or edit photos, and create graphics, depending on the software.
Therefore, You can combine several images to create one image. -------Layers. You can choose from a variety of strange shapes. —- Lasso. You can draw rectangles, circles, and other geometric shapes.-- Drawing. Furthermore, you can select areas based on color.------Magic Wand.
Learn more about graphic design tool here:
https://brainly.com/question/9105717
#SPJ5
HELLLPPPPPP For each of the following discussion questions, write a response in complete sentences. Your response should be at least one paragraph (5 to 7 sentences). Each discussion response is worth a total of 5 points.
What are three ways that you can protect and care for your camera? Why is taking care of your camera important? I got logged out and it didnt save my work and i need to get done with thissssss
Answer:
Avoid dirt and sand. Use care when cleaning dirt particles and sand from your digital camera. Do not use canned or pressurized air to clean the sand, as you might just drive the particles into the camera case. Budget-priced camera cases might not be sealed perfectly, making it easier for grit and sand to penetrate the case and cause damage. Gently blow out the grit and sand to avoid this problem. Use care when shooting photos on a windy day at the beach, too, where sand can blow with excessive force. Avoid opening the battery compartment on such days.
Avoid liquids. Keep all liquids away from the camera unless you own a model with a waterproof case.
Avoid touching the lens and LCD. Oils from your skin smudge the lens and LCD, eventually causing permanent damage. Clean the lens and LCD with a microfiber cloth when you see a smudge from your fingertips.
The lens and sun don't mix. Do not point your camera's lens directly at the sun for any length of time, especially with a DSLR camera. Sunlight focused through the lens of the camera could damage the image sensor or even start a fire inside the camera.
Use cleaning liquids with care. Avoid using an excessive amount of cleaning liquid with your camera. In fact, other than stubborn smudges, you should be able to clean the camera with a dry microfiber cloth. If a liquid is needed, place a few drops of the liquid on the cloth, rather than directly on the camera.
Vacuum the bag. Dirt and sand inside your camera bag could damage your camera, so vacuum the bag regularly to keep it clean and protect your camera.
Watch the temperature. Although some cameras are designed to survive harsh temperatures, most cameras are not. Do not leave your camera in a sunny vehicle, where temperatures quickly can exceed 100 degrees Fahrenheit. Avoid leaving the camera in direct sunlight, which can damage the plastic. Finally, avoid extreme cold, too, which could damage the LCD.
Use neck straps and wrist loops. Use neck straps and wrist loops with your camera. If you slip while hiking, or if you lose the grip on your camera near the pool, the straps can save your camera from a potentially disastrous fall.
Store camera properly. If you're not going to use your camera for a couple of months, store it in a low humidity area and out of direct sunlight. Additionally, store the camera without the battery inserted to reduce the risk of corrosion.
Explanation:
:)
Identity management programs often implement a _________system that facilitates the management of user accounts.
Answer:
single sign-on
Explanation:
Identity management programs in computer operation involve an administrative process that is carried out by implementing a SINGLE SIGN-ON system that facilitates the management of user accounts.
The purpose is to identify, validate, and approve an individual or group of people to have permission to various applications, computer systems, or networks by linking user rights and limitations with created identities.
Hence, in this case, the correct answer is SINGLE SIGN-ON
Language: C
Introduction
For this assignment you will write an encoder and a decoder for a modified "book cipher." A book cipher uses a document or book as the cipher key, and the cipher itself uses numbers that reference the words within the text. For example, one of the Beale ciphers used an edition of The Declaration of Independence as the cipher key. The cipher you will write will use a pair of numbers corresponding to each letter in the text. The first number denotes the position of a word in the key text (starting at 0), and the second number denotes the position of the letter in the word (also starting at 0). For instance, given the following key text (the numbers correspond to the index of the first word in the line):
[0] 'Twas brillig, and the slithy toves Did gyre and gimble in the wabe;
[13] All mimsy were the borogoves, And the mome raths outgrabe.
[23] "Beware the Jabberwock, my son! The jaws that bite, the claws that catch!
[36] Beware the Jubjub bird, and shun The frumious Bandersnatch!"
[45] He took his vorpal sword in hand: Long time the manxome foe he sought—
The word "computer" can be encoded with the following pairs of numbers:
35,0 catch
5,1 toves
42,3 frumious
48,3 vorpal
22,1 outgrabe
34,3 that
23,5 Beware
7,2 gyre
The .cpp code is avaiable bellow
Code:
#include <stdio.h>
#include <string.h>
int main()
{
char **kW;
char *fN;
int nW = 0;
kW = malloc(5000 * sizeof(char*));
for (int i = 0; i<5000; i++)
{
kW[i] = (char *)malloc(15);
}
fN = (char*)malloc(25);
int choice;
while (1)
{
printf("1) File text to use as cipher\n");
printf("2) Make a cipher with the input text file and save result as output file\n");
printf("3) Decode existing cipher\n");
printf("4) Exit.\n");
printf("Enter choice: ");
scanf("%d", &choice);
if (choice == 1)
{
nW = readFile(kW, fN);
}
else if (choice == 2)
{
encode(kW, fN, nW);
}
else
{
Exit();
}
printf("\n");
}
return 0;
}
int readFile(char** words, char *fN)
{
FILE *read;
printf("Enter the name of a cipher text file:");
scanf("%s", fN);
read = fopen(fN, "r");
if (read == NULL)
{
puts("Error: Couldn't open file");
fN = NULL;
return;
}
char line[1000];
int word = 0;
while (fgets(line, sizeof line, read) != NULL)
{
int i = 0;
int j = 0;
while (line[i] != '\0')
{
if (line[i] != ' ')
{
if (line[i] >= 65 && line[i] <= 90)
{
words[word][j] = line[i]; +32;
}
else
{
words[word][j] = line[i];
}
j++;
}
else
{
words[word][j] = '\n';
j = 0;
word++;
}
i++;
}
words[word][j] = '\n';
word++;
}
return word;
}
void encode(char** words, char *fN, int nwords)
{
char line[50];
char result[100];
if (strcmp(fN, "") == 0)
{
nwords = readFile(words, fN);
}
getchar();
printf("Enter a secret message(and press enter): ");
gets(line);
int i = 0, j = 0;
int w = 0, k = 0;
while (line[i] != '\0')
{
if (line[i] >= 65 && line[i] <= 90)
{
line[i] = line[i] + 32;
}
w = 0;
int found = 0;
while (w<nwords)
{
j = 0;
while (words[w][j] != '\0')
{
if (line[i] == words[w][j])
{
printf("%c -> %d,%d \n", line[i], w, j);
found = 1;
break;
}
j++;
}
if (found == 1)
break;
w++;
}
i++;
}
result[k] = '\n';
}
void Exit()
{
exit(0);
}
What is the best scenario to use a display font?
for quickly read messages, such as a highway sign
for important, dense information, such as a nutrition label
for small type, such as in body copy
for large type, such as a title
Answer:
For large type, such as a title
Explanation:
i tried all of the answer's til i got the right one
The best scenario to use a display font is that it makes the requirement to type large, such as a title. Thus, the correct option is D.
What is a Display font?A display font may be defined as the arrangement of words with respect to the requirement that makes the writing more attractive, effective, and understandable.
Display font is utilized in order to determine how a font face is represented based on whether and when it is downloaded and ready to use.
Display fonts generally include large types of texts which are used to frame a title. This makes the title more attractive, effective, and ready to read from a long distance as well.
A title is the main characteristic that influences the readers about the writing.
Therefore, the best scenario to use a display font is that it makes the requirement to type large, such as a title. Thus, the correct option is D.
To learn more about fonts, refer to the link:
https://brainly.com/question/14052507
#SPJ2
A line drawn around the edges of an element, such as a table or a table call
Answer:
It is called Borders..can also be drawn around paragraphs and pages..