A zero-tolerance policy means that if the employee violates the policy, they will be fired. Thus, the correct answer is option B.
What is a Zero-tolerance policy?A zero tolerance policy is one that penalizes every violation of a stated rule. People in positions of authority are prohibited by zero tolerance policies from exercising discretion or changing punishments to fit the circumstances subjectively. They must impose a predetermined punishment regardless of individual guilt, extenuating circumstances, or history.
Zero tolerance policies are studied in criminology and are used in both formal and informal policing systems worldwide. If an employee violates the policy, there will be no tolerance and they will be fired.
Therefore, a zero-tolerance policy means that if the employee violates the policy, they will be fired.
To learn more about zero-tolerance policy, click here:
https://brainly.com/question/27293242
#SPJ2
You can always trust information that comes from websites ending in. . com
Answer:
No, Don't go there I can name more than 3 websites that end in ".com" that u cant trust.
Explanation:
Explain the main concept of Artificial Neural networks (ANN) as a set of layers that starts with an input layer that has sensors and the output layer that gives the predicted result (predictions) with hidden layers in between based on the ANN architecture and its specific type of application Knowledge One Individual Practical Assignment
Artificial Neural networks is a computational tool that is made up of a let of processing elements that takes in inputs and deliver outputs using a predefined activation codes.
What are the layers in an artificial neural network?There are 3 Artificial olfactory sense and recognition system that are found in ANN. It is made up of:
An input layer.An Hidden layer.An Output layer.Note that these layers above help to tell more about the Artificial Neural networks (ANN).
Learn more about Artificial Neural networks (ANN) from
https://brainly.com/question/25653113
What command allows the root user to create a crontab file for the user jdoe?
The command allows the root user to create a crontab file for the user jdoe is As root, execute crontab -e jdoe.
What is the command in crontab?The crontab command is known to be that often submits, make some editing, lists, or delete cron jobs.
Note that A cron job is a type of command that is often aided or run by the cron daemon at a consistent and scheduled times.
Conclusively, The As root, execute crontab -e jdoe command will give room for the root user to create a crontab file for the user named jdoe.
Learn more about command form
https://brainly.com/question/25243683
17) If you want to find the average salary (with each employee's salary found in column C) for those who are full time employees (which will have "FT" in column B), you would use the ________ function.
A. COUNTAVERAGE
B. IFAVERAGE
C. AVERAGE
D. AVERAGEIF
Answer:
AVERAGE
Explanation:
THIS is a function used in Microsoft Excel.
The steps to find average is
Sum/TotalHence
first we use AUtoSUM function to find sum then we use average to calculate
Answer:
AverageExplanation:
If you want to find the average salary (with each employee's salary found in column C) for those who are full time employees (which will have "FT" in column B), you would use the AVERAGE function.
The first three elements of the Continuous Delivery Pipeline work together to support delivery of small batches of new functionality which are released in accordance with what?
Answer:
is Market needs
Explanation:
The first three elements of the continuous delivery pipeline mediates the support to the small batches thereby to be released in accordance with the market demand.
What is continuous delivery pipeline?The continuous delivery pipeline can be given as the software application that enables the development of the new code with the automation to speed.
The first three elements of the continuous delivery pipeline are Continuous Exploration (CE), Continuous Integration (CI), and Continuous Deployment (CD).
The elements mediates the support to the small batches to be released in accordance with the market demand.
Learn more about continuous delivery, here:
https://brainly.com/question/14402781
#SPJ2
A person entering the field of financial analysis
will end up taking what kind of classes in
college?
A. accounting
B. agriculture
C. astronomy
D. advertising
Answer:accounting
Explanation:
Ncomputing and thin client
what it is
why is done , how it works and how it's
done
The term NComputing is known to be a form of desktop virtualization company that is said to creates hardware and software to form virtual desktops.
The term Thin clients is known to be virtual desktops. They help a lot of users at the same time to share a single operating system instance.
What is the aim of a thin client?In Ncomputer networking, a thin client is known to be a kind of low-performance computer that is known to be optimized and used for setting up a remote connection.
It is often used with a server-based computing system. The server here is one that often does most of the work, such as launching software programs, etc.
Learn more about Ncomputing from
https://brainly.com/question/12629145
Computer A uses Stop and Wait ARQ to send packets to computer B. If the distance between A and B is 40000 km, the packet size is 5000 bytes and the
bandwidth is 10Mbps. Assume that the propagation speed is 2.4x108m/s
a) How long does it take computer A to receive acknowledgment for a packet?
b) How long does it take for computer A to send out a packet?
The time that it takes the computer to receive acknowledgment for a packet is 0.1667 seconds. The time it takes to send out a packet is 4 x 10⁻³seconds
1 The acknowledgment time for the packetspeed = 2.4x108m/s
Distance = 40000 km,
Time = distance/ speed
= 40000 x10³/ 2.4x10⁸m/s
= 0.1667
The time that it take is 0.1667 seconds.
b. Number of bytes = 5000
5000x 8 = 40000bits
10 mbps = 10000 kbps
10000 kbps = 10000000
packet size / bit rate = 40000/10000000
= 4 x 10⁻³seconds to send a packet out
Read more on computer bandwith here: https://brainly.com/question/27020560
9) Which date is assigned the serial number of 1?
A. January 1, 1700
B. January 1, 2000
C. January 1, 1900
D. January 1, 1800
Answer:
c) January 1, 1900
Explanation:
January 1, 1900 (1 - 1 - 1900) is assigned the serial number of 1. The serial number 1 represents January 1, 1900. Hence, option (c) is the correct answer.
How many bytes can be stored in a 4gb flash drive
Answer:
4,294,967,296; theoretically
Explanation:
There is 1024 bytes in a kb, 1024 kb in a mb, 1024 mb in a gb.
So we can use 1024³ as a multiplier to convert gb->byte.
1024³ * 4 = 4,294,967,296 bytes.
However, in practice hardrives always have less useable storage than the quoted amount.
Difference between single dimensional array and double dimensional array
Which of the following is a valid byte?
11100
11011011
00000000
10022011
Answer:
11011011
00000000
Explanation:
10022011 cant be an answer because bits are composed of 0s and 1s
and 11100 is too small.
ICT4AD was meant to modernize the civil service through E-governance implementation.
Explain why you believe that this policy has achieved or not achieved this goal?
ICT4AD work through E-governance implementation fail as a result of:
Lack of Infrastructure. High cost of running its affairs as it needs huge public expenditure. Issues with Privacy and Security and others.What is the aim of e-governance?The objectives of e-Governance is created so as to lower the level of corruption in the government and to make sure of fast administration of services and information.
Conclusively, It is known to fail due to the reasons given above and if they are worked on, the service would have prospered.
Learn more about civil service from
https://brainly.com/question/605499
Difference between centralized and decentralized processing in computer
How many categories of computer do we have?
Answer:
The 10 types of computers include personal computers, desktops, laptops, tablets, hand-held computers, servers, workstations, mainframes, wearable computers and supercomputers.
6. Which of the following items is not a storage
medium?
A. Plotters
B. Zip disk
C. Hard disk
D. Memory stick
Answer:
Plotters
Explanation:
A 'plotter' is an external hardware device like a printer used with a computer to 'print vector graphics' - basically in english it no hold storage like that
what seemingly useless item can be of social, ecological or commercial value?
Some seemingly useless item can be of social, ecological or commercial value is money, behavior, death etc.
What is something really useless?A useless item are known to be things that are said to be rubbish.
They are items that is useless, of no value. Some useless item can be of social, ecological or commercial value is money, behavior, vehicles etc.
Learn more about commercial value from
https://brainly.com/question/25528419
What command is used to list at jobs that are scheduled for execution?
The command that is used to list at jobs that are scheduled for execution is The at command.
What is the at command?This is known to be a kind of a Linux command-line utility. It function mainly to book down a job for future execution.
Conclusively. This kind of utility is one that reads commands from standard input and them bind them together into an at job, which can only be executes only once at a time.
Learn more about command from
https://brainly.com/question/25808182
In programming 2+6 is an example of what math
Answer:
[tex]beinggreat78~here~to~help.[/tex]
2 + 6 in programming is an example of math. It is the same as in the real world. Plus signs in coding are also a form of string concatenaction, the term used for combining two strings into one, or a variable into a string.
How does a workstation differ from a server in terms of price processing power storage and computer memory
Workstations are laptops and PCs that quickly perform complex, technical tasks such as digital content creation and detailed analysis. Servers are software and hardware that store data, manage network resources, and fulfill client requests.
This week, we have covered network management which include topics such as System message log, SNMP, Netflow, QoS, VPN, and default gateway redundancy. Discuss one feature you would implement in your network and how you use it.
There are lot of system network. I would love to implement the use of VPN in my network.
What is a gains of implementing a VPN?The use of VPNs is one that helps a person to have a better form of total security, it also make performance better, remote access, anonymity, an others.
Conclusively, Note that the use of VPN can be affordable as it is cheap and it can prevent hackers having access to your data or system.
Learn more about VPN from
https://brainly.com/question/25554117
Luke is working on a layout for a catalog. He adds cross lines on the four corners of the layout to mark out a small extra margin. What are these lines called?
A.
edge
B.
dark
C.
index
D.
trim
Cross lines that are added on the four corners of a layout to mark out a small extra margin is called: D. trim.
What is layout design?Layout design can be defined as a graphical design process that involves the use of one or more grids for the design of a catalog and system, so as to make the designs visually appealing to end users.
In a layout design, trim refers to the cross lines that are added on the four (4) corners of a layout to mark out a small extra margin.
Read more on layout design here: https://brainly.com/question/13732745
The algorithm solves the problem
of size n by recursively solving
sub-problems of size n – 1, and
then combining the solutions in
Q(n) time.
Looking at the question on algorithm above, the correct answer is: [tex]O( {2}^{n} )[/tex]
What is algorithm?Algorithm refers to a sequence of instructions that have been well-defined which helps to solve specific problems. Algorithm is used in computation.
The recurrence relation is:
T(n)=2.T(n-1)+c , n>0
T(n)=1, n=0.
Considering the back substitution method,
T(n) = 2kT(n-k)+ 2k-1c+....+20c
Substitute n-k=0
Therefore, we will have:
T(n) = 2nT(0)+ 2k-1c+....+20c
T(n) = [tex] {2}^{n - 1} + 1[/tex]
T(n) = [tex]O( {2}^{n} )[/tex]
Learn more about algorithm on https://brainly.com/question/24953880
What is Word's default color for highlighting text?
O orange
O gray
O yellow
O blue
Answer:
Yellow.
Explanation:
Yellow is typically the color but you can always manually change it.
Answer:
yellow
Explanation:
On the home tab of the ribbon the default color for highlighting text and tool is yellow
6. Create lookup functions to complete the summary section. In cell I6, create a formula using the VLOOKUP function to display the number of hours worked in the selected week. Look up the week number in cell I5 in the range A17:G20, and return the value in the 2nd column. Use absolute references for cell I5 and the range A17:G20.
Answer:
Reporting period hours Timesheet Due Name 44260 Period Start 44228 Period End 40965 Summary Balances Date Completed 43722 Week # 1 Period Start Period End Worked
Strategies of Green computing include:
Answer:
Equipment recycling, reduction of paper usage, virtualisation, cloud computing, power
Name three things that get information into a computer?
Answer:
Input devices do that. Three are the keyboard, a mouse, and a trackball.
Explanation:
display unit is capable of displaying test but not
Answer:
I think your question must be display unit is capable of displaying text but not.
Explanation:
A text display is an electronic alphanumeric display device that is mainly or only capable of showing text, or extremely limited graphic characters.
list the factors that influenced the advancement of AI in recent years
Answer:
In any case, there are 5 factors which are driving the development of Artificial Intelligent and other technologies of Big Data, ML, etc.
Next-Generation Computing Architecture. ...
Open Data. ...
Growth in Deep Neural Networks. ...
Legal and Ethical Issues. ...
Historical Datasets.
Write a C++ program to grade the answers to a true-false quiz given to students in a course. The quiz consists of 5 true-false questions. Each correct answer is worth 2 points.
The quiz program is an illustration of loops and conditional statements
Loops are used to perform repetitionConditional statements are used to make decisionsThe quiz programThe quiz program written in C++, where comments are used to explain each action is as follows:
#include <iostream>
using namespace std;
int main(){
//This prints the instruction
cout<<"Enter T/t for True; F/f for False\n";
//This initializes the question
string questions[5] = { "Q1", "Q2", "Q3", "Q4", "Q5"};
//This initializes the correct options
char options[5] = { 'T','T','F','F','T'};
//This declares the user response
char opt;
//This initializes the score to 0
int score = 0;
//This loop is repeated 5 times
for (int i = 0; i < 5; i++){
//This prints the current question
cout << i + 1 <<". "<<questions[i]<<"\nAnswer: ";
//This gets the user response
cin>>opt;
//If the user response is correct
if(toupper(opt) == options[i]){
//The score is incremented by 2
score+=2;
}
}
//This prints the total score
cout<<"Score: "<<score;
return 0;
}
Read more about loops at:
https://brainly.com/question/19347842