Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional or inappropriate way? Check all of the boxes that apply.

checking social media networks during working hours

surfing the Internet during working hours for what to do on the weekend

downloading a favorite band’s latest album from a file-sharing service

Answers

Answer 1

Answer:

All of the above.

Explanation:

You shouldn't be doing any of these things using your employer's computer networks, even if there aren't any explicit rules against them. For one thing, your usage of company systems and networks is being continuously monitored, so you can forget about trying to get away with it. Checking social media and surfing the internet can expose parts of your personal life that you don't want anyone else to see, and downloading anything from anywhere is dangerous, especially if you're pirating music from some backwater site where adult sites and survey scams are waiting to bombard the whole network with pop-up ads. You should always do these things on your personal devices while connected to your personal home network.


Related Questions

List 2 differences between routing messages and broadcasting messages


Answers

Answer:

Hub is an example of a broadcast device.

Switch is an example of a multicast device

what are the differences between a keyboard and a pointing stick.​

Answers

Answer:

keyboard:

A keyboard is for putting information including letters, words and numbers into your computer. You press the individual buttons on the keyboard when you type. The number keys across the top of the keyboard are also found on the right of the keyboard. The letter keys are in the centre of the keyboard.

pointing stick:

A pointing stick is a small joystick used as a pointing device typically mounted centrally in a computer keyboard. Like other pointing devices such as mice, touchpads or trackballs, operating system software translates manipulation of the device into movements of the pointer or cursor on the monitor.

given a line of text as input, output the number of characters excluding spaces, periods, or commas.

Answers

Answer:

python:

x = input()

print(len(x))

Explanation:

Convert the denary number 44801 into hexadecimal

Answers

Numbers can be converted between bases.

The equivalent of 44801 in hexadecimal is: AF01

Denary numbers are simply base 10 numbers, while hexadecimal numbers are base 16 numbers

To convert from base 10 to base 16, we make use of division method (and we keep track of the remainders)

We keep dividing by 16, until we can no longer divide the numbers.

So, we have:

[tex]\mathbf{ 44801 \div 16 = 2800\ R\ 1}[/tex]

[tex]\mathbf{ 2800 \div 16 = 175\ R\ 0}[/tex]

[tex]\mathbf{ 175 \div 16 = 10\ R\ 15}[/tex]

[tex]\mathbf{ 10 \div 16 = 0\ R\ 10}[/tex]

Write out the remainders from bottom to top

(10) (15) 0 1

10 in hexadecimal is A15 in hexadecimal is F

So, the number becomes: AF01

Hence, the equivalent of 44801 in hexadecimal is: AF01

Read more about number conversions at:

https://brainly.com/question/2824068

what is the answer ??​

Answers

= Option b Minicomputer ..........

Answer:

Minicomputer answer The HP 2100 is a series of 16-bit minicomputers that were produced by Hewlett-Packard (HP) from the mid-1960s to early 1990s. Bro please follow me we should help each other

what is one disadvantage people face without a checking account?

Answers

Answer:

If they have a job that only pays with ckecks they won't be able to have their paycheck.

Explanation:

Why would you browse by entering a URL rather than use a link in a Web page

Answers

Answer:

Rather than entering a URL in a web browser, I prefer to browse the webpage. Because if you do browse in the browser you can see other alternative options to that website.

What is a computer? ​

Answers

Answer:

A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks. A computer system is a "complete" computer that includes the hardware, operating system, and peripheral equipment needed and used for "full" operation. This term may also refer to a group of computers that are linked and function together, such as a computer network or computer cluster.

Explanation:

Automated Deployment is one of the prerequisite for DevOps Implementation.1. True2. False

Answers

True I think………………………..

Automated Deployment is one of the prerequisite for DevOps Implementation is a true statement.

Automated deployment

Automated deployment provides the ability to move your software between testing and production environments by using automated processes.

In other words, it allows organizations to release new features faster and more frequently.

Automated deployment allows faster approach to development, production  and deployment.

learn more on automated deployment: https://brainly.com/question/17052494

#SPJ2

What component uses thermal paste to attach the heat sink?

Answers

Answer:

Thermal compound is the answer

Order the steps to describe how to attach a contact to a new email

Answers

Answer:

confirm image correct

Explanation:

what is output if the user types 13 click all that apply ABCD

Answers

Answer:

AD?

Explanation:

Answer:

A C D

Explanation:

youre welcome :)

please help

in two to three sentences describe how you would divide a page into two columns.​

Answers

Follow the steps outlined:-

Highlight the text you wish to split into columns.

Select the “Page Layout” tab.

Choose “Columns” then select the type of columns you wish to apply. One. Two. Three. Left. Right.

what feature is required to track customer search terms on a website?

Answers

Answer:

Site Search feature is required to track customer search terms on a website..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. She can access the network from her usual office, but today, she is trying to access the wireless network from a conference room, which is across the hall and next to the elevator. Which of the following is the MOST likely cause of her connectivity problem?

a. The user has not yet rebooted her laptop computer while at her new location.
b. The user needs a new IP address because she is working on a different floor.
c. The wireless network access point on the user's normal floor has failed.
d. The user is out of the effective range of the wireless access point on her floor.
e. The user has not yet logged off and back on to the network while at her new location.

Answers

Answer:

d. The user is out of the effective range of the wireless access point on her floor.

Explanation:

You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications are installed on the C: volume on the first hard disk. Because of the size of the audio files you produce, you keep them on a separate volume (D:) located on the second hard disk. Your Windows desktop system has system protection enabled on the both drives. You need to configure system protection on this system to maximize overall protection. What should you do

Answers

Answer:

You can go to the windows group policy settings and turn the security mode to thw highest or just installing a AV system that has a good reputation.

Hope this help please give the brainliest award would be much appreciated.

Which operating system is designed to operate a desktop computer or portable device used by an individual?

Embedded OS
Stand-alone OS
Network OS
Client OS

Answers

Answer:

Embedded operating system

The Embedded OS designed to operate a desktop computer or portable device used by an individual option (A) is correct.

What is a computer?

A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers.

An operating system is a piece of system software that controls computer resources, hardware, and common services for software programs.

The embedded operating system is designed to operate a desktop computer or portable device used by an individual.

Thus, the Embedded OS designed to operate a desktop computer or portable device used by an individual option (A) is correct.

Learn more about computers here:

brainly.com/question/21080395

#SPJ2

if you could travel back in time where would you go? what would you do? explain

Answers

Answer:

I would challenge the temporal paradox.

Explanation:

A temporal paradox, time paradox, or time travel paradox is a paradox, an apparent contradiction, or logical contradiction associated with the idea of time and time travel.

5.Write a program that calculates the factorial of a given number (for example, factorial of 5 = 120).

Answers

Answer:

Using c++ syntax

int givenNumber= 5; //can set to something else

int answer = 1;

for (int i = 1; i <= givenNumber; i++){

   answer *= i;

}

in this code how many times will it repeat? for(i = 0; i < 8; i++) {forward();}

Answers

Answer:

It will repeat 8 times. because in the statement above the variable i has to be more then 8, so until the variable i has the value of it it will repeat. So it will repeat 8 times .

Which hacking technique uses network monitoring devices?

Sniffing
Shoulder surfing
Physical security threat
Wire tapping

Answers

Answer:

The answer is sniffing, because sniffing is a process that captures all the data packets, when the network is mentioned.

how to install windows 11 on unsupported processor

Answers

Answer: You can't, if you anyway bypass the system, your device will run on risk.

Suggestion: Use any Linux distro similar windows 11. Like - Ubuntu/ Linux Mint/ ElementaryOs.

(Suggestion is only for if you can't run windows 10 or the pre installed Operating System in your machine.)

whenever I try to make an account it says it can't sign me up at this time or something- can you help?-

Answers

Answer:

You can try emailing tech support and describing your issue. In order to get the best help as quickly as possible, try providing screenshots of what happens when you sign in or describe everything you see on the screen when the problem occurs, and quote error messages directly when possible.

How can we repair a head jack of a laptop charger.????​

Answers

Answer:

Step one turn off the laptop. And take out the battery step two remove the Phillips screw. And then take out the back. Cover. Step three remove four phillips screws. And then take out the hard.

Explanation:

Which TWO are examples of the internet reducing the use of paper?

Answers

Answer:

Using word documents instead of paper can save lots of paper especially, when lots of people are doing that already. Using emails can reduce the amounts of letters being sent to people.

what is the difference between internal and external css?

Answers

Answer:

Internal CSS are the ones that we can write within the same file i.e the HTML code and CSS code are placed in the same file. External CSS are that we can write in a separate file than the html code i.e the HTML file is separate like(index. ... css).

Explanation:

Does anyone know how to write this right? This is for a coding class and I’m super confused on it.

First activity:

1. Declare three variables: firstSnack,
second Snack, and thirdSnack.
Assign the name of a snack (as a string)
to each variable.

2. Declare another variable and call it
bestSnack.
Assign a value to bestSnack USING THE
NAME OF ONE OF THE ABOVE VARIABLES.
Do not use a string directly.

3. Now, change your mind! Reassign the value
of bestSnack, again using the variable name,
not the string. (THIS SHOULD BE DONE ON
A NEW LINE)

Second activity:

4. Declare three variables and give them the names of three common grocery items. Assign to each variable a NUMBER value approximately its price. Don’t use $ sign, just the actual number.

5. Declare another variable, name it total, and assign to it the SUM of the three other variables, contain. Hint - you’ll need to use an arithmetic operator to do this.

Answers

Answer:

This is using c++ syntax, you might need to make slight adjustment for other languages.

First activity:

string firstSnack = "chips";

string secondSnack = "pizza";

string thirdSnack = "apples";

string bestSnack =  firstSnack;

bestSnack = secondSnack;

Second activity:

double apple = 0.5;

double banana = 0.75;

double orange = 1.43;

double total = apple + banana + orange;

Explanation:

When first declaring a variable, you want to specify the type (such as int, double, string, bool, etc.) and then the name. You can set the variable value in the declaration, or you can set it to a value later in the program by not having the equals sign and whatever comes next.

did someone really hang themselves on wizard of oz

Answers

Answer:

Yes they did

Explanation:

If you look closely in the back, in the part where they sing where off to see the wizard the wonderful wizard of oz. Just look behind dorothy's head and you will see a man hanging himself

what is the best protection method for sharing pii

Answers

Answer:

What is the best protection method for sharing (PII)? Digitally sign and encrypt the email..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

how many times should the start function be defined in a program?

Answers

Answer:

0 1 2 However many you like

✓ I think its 2x they will start to define the program

Other Questions
How many milliliters are in 3.2 L? (1000 mL = 1L) Given h(x) = 4x + 5 solve for when h(x) = 9 . You spin each spinner once. You get $50 if you spin a 2 and a vowel. You get $25 if you spin a 2 and a consonant. You get $5 if you spin a 1 and a vowel. Everything else earns $0. What is the expected value of this game? $8.75 $12.50 $80 $10.25 Each time a hurricane arrives, a new home has a 0.4 probability of experiencing damage. The occurrences of damage in different hurricanes are mutually independent. a. Calculate the probability that there will be at least two hurricanes from which the home will experience no damage before the second hurricane from which the home will experience damage. b. Calculate the probability that the home will experience its second damage from the fourth hurricane, given that the home has not experienced two damages from the first two hurricanes. c. Calculate the mode of the number of hurricanes it takes for the home to experience damage from three hurricanes. please help i wasnt at school for like a month If 8 pizzas cost $72,how much will 15 pizzas cost please helpppppppppppppppppppp please help with this Find the value of g for which MATH is a parallelogram.A. 5B. 6C. 7D. 10 ILL GIVE BRANLIEST!! HELP NOW!!! Garnet has a container with 4 1/3 cups of flour in it. She can make one dozen muffins with cups of flour. How many dozens of muffins can Garnet make with the flour she has? A. 10 1/9 B. 1 6/7 C. 1 1/3 D. 2 production of red blood cells is regulated by a hormone secreted from cells in the im not completely sure how to use slope (7th grade) Which sources of energy are used by humans to produce electrical energy 1. State Mendel's Law of Inheritance.2. What are the two alleles for flower color in snapdragon? 3. State the Law of Non-Mendelian Inheritance in snapdragon. Asking again since I still dont understandSkylar collects coins and stamps. She wants to organize her collections to display them together. She has 56 coins and 72 stamps,and she wants the same number of each item in each display.What is the greatest number of displays Skylar can make?Enter your answer in the box. founded in 1842, motts started selling apple juice in 1938, and now offers a wide variety of apple-based products in its product line. motts, over the years, increased its Tony is saving money to buy a game. So far he has saved S18, which is two-thirds of the total cost of the game. How much does the game cost Decide if the following statement is true or false. A simple random sample of twelve 2+ bedroom houses in Rockingham County has a mean monthly lease of $695 with a standard deviation of $135. The true rental cost will be from $560 to $830 helpppppppppppppppppp im doing a 8th grade benchmark what is a sentence fragments