Explanation:
In every profession, codes of ethics are usually on ground which are designed to guide professionals in carrying out their responsibilities with honesty and integrity.
Ethical codes are very necessary and important for technical managers.
It motivates professionals to carry out their duties well and also provide an education for new employees on how to carry out their professional duties.
A code of ethics tells professionals their responsibilities at the workplace and certain punishments are set in the presence of violations.
This code forbids professionals from having any involvements in deceptive practices. Computer professionals have to make sure that they know their moral responsibilities and they also have to know those to whom they are responsible.
Those Professionals that are involved in the process of data handling and data processing are mostly responsible for their employers and also the public.
For this, there should be guidelines that these professionals must follow. The job of Data handling is a very sensitive one, computer professionals must first be responsible citizens.
The Code of ethics sets limits to the activities of computer professionals. For example, when we talk about data processing, we know how much privacy is needed here. Privacy is a very great concern because there are hackers who are on the lookout to steal your data.
The Code of ethics stops professionals from engaging in discussions about their job outside the workplace. It makes professionals more sincere and also more dedicated to their job. It also helps them take important decisions as well as policy formulations to guide actions. Code of Ethics created an awareness of the legal standards of the company to the professional who works in that company.
Write a program that calculates the average of N integers. The program should prompt the
user to enter the value for N and then afterward must enter all N numbers. If the user enters a
negative value for N, then an exception should be thrown (and caught) with the message “ N
must be positive.” If there is any exception as the user is entering the N numbers, an error
message should be displayed, and the user prompted to enter the number again.
Answer:
def Average(num):
if num == 0:
return 0
val = 0
trueNum = num
for i in range(0, num):
try:
val += int(input("Enter value (%d out of %d): " % (i+1,num)))
except Exception as e:
print ("Error processing value. Non integer detected.")
try:
val += int(input("Enter value (%d out of %d): " % (i+1,num)))
except Exception as e:
print ("Error processing value. Non integer detected.")
print ("OMITTING value from average.")
trueNum -= 1
return val/trueNum
def main():
try:
num = int(input("Enter a value N for amount of items: "))
if num < 0:
raise(ValueError)
except ValueError:
print ("N must be positive integer.")
exit(1)
print("Average: ", Average(num))
exit(0)
if __name__ == "__main__":
main()
Explanation:
This program is written in Python to collect some integer value from the user as an upper bound of integers to be input for an average. Using this upper bound, the program checks to validate it is indeed an integer. If it not an integer, then the program alerts the user and terminates. If it is a user, the Average function is called to begin calculation. Inside the Average function, the user is prompted for an integer value repeatedly up until the upper bound. Using the sum of these values, the program calculates the average. If the user inputs a non integer value, the program will alert the user that the value must be an integer and ask again. If the user again inputs a non integer value, that iteration will be omitted from the final average. The program this prints the calculated average to the user.
Cheers.
________________ are piece of programs or scripts that allow hackers to take control over any system.
Answer:
Exploits
Explanation:
Exploits can be explained to be a piece of programmed softwares or scripts that can give hackers the opportunity to take control over any system and exploit this system's vulnerabilities. The vulnerability scanners that hackers use includes, Nessus, Nexpose e.tc.
They use these scanners above to search for vulnerabilities.
Eun-Joo is working on a circuit board. There is no electrical current flowing through a certain switch on the circuit board.
What state is that switch in?
binary
state 0
state 1
user mode
Answer:
state 0
Explanation:
in binary 0 is off.
Answer:
state 0
Explanation:
Documenting findings, actions, and outcomes of network troubleshooting calls is an essential part of the troubleshooting process. List the reasons why documentation is critical, and discuss the form that this documentation could take (e.g. blogs, wikis, professional document management software, etc). Include a detailed description of what information would need to be saved.
Answer:
The main purpose of documentation is for future reference on the cost, materials, procedures, and techniques used in a task. It can be in form of a video log, report, digital text document or software, etc.
Explanation:
Documentation is an important practice of taking notes of events during a process. It could in the process of creating or discovering new ideas or repair or management of existing processes. It holds the time, cost, technique, event name, measures-taken, etc, that would totally describe the event.
How do I fix unidentified network Windows 10 Ethernet? No answer needed, just want to get rid of points.
Answer:
Umm call the people
Explanation:
Thx
Where the heck is the leader board?
I HAVE NO IDEA WHERE THE LEADERBOARD IS #### #### #### #### #### ####.
Write Python code that asks a user how much money they spend at the store sale. If the user spends less than $75, they receive no discount. If the user spends $75 or more, they receive $15 off. If the user spends $100 or more, they receive $25 off. If the user spends $150 or more, they receive $50 off.
Answer:
5000
Explanation:
506+567=5000
For the purposes of laying out content, the total height of a box is calculated by adding which of the following?
content height and the top and bottom margins, borders, and padding
content height, margin height, and page element height
content length of the box, webpage height, and top margin
content height, top margin, and bottom margin
content height and the top and bottom margins, borders, and padding
Write a simplified machine language program that has register $s0 loop through the numbers 0, 100, 200, ..., 500. See Lab 11 for details on submitting the simplified machine language programs.
Answer:
Explanation:
li $s4 , 100 // Initialize register $s4 with 500 for checking the condition when $s0 is equal to 500
Loop : li $s0 , 0 // Initialize register $s0 with0
abc : addi $s0 , 100 // Add 100 to register $s0
bne $s0, $s4 , abc // Branch to label abc if not equal to 500
beq $s0, $s4 , Loop // Branch to label Loop if equal to 500
list any three importance of computer
Answer:
here is the answer
Explanation:
1) accurate
2) fast
3) can accomplish tasks more effencily
An algorithm whose worst-case time complexity is bounded above by a polynomial function of its size is called a(n)
Answer:
polynomial-bounded algorithms
Explanation:
There are two algorithm complexities and they are time and space complexities. They can be denoted with the big-O notation. The big-o notation for a time and space complexity gets the worst-case time and space respectively.
The time complexity gets the measure of the execution time of an algorithm. When the time function is a polynomial ( k^n + k^n-1 ...) then the algorithm is said to be a polynomial-bounded algorithm.
Write an LC-3 assembly language program to read in a two-digit decimal number whose digits add up to less than 10 and display the sum of those digits in the next line.
Sample execution (user input underlined) : Please enter a two-digit decimal number > 27. The sum of the digits = 9
Answer:
Explanation:
.MODEL SMALL
.STACK 100H
.DATA
STR1 DB 0AH,0DH, 'THE SUM OF TWO DIGITS PRENT IN THE GIVEN NUMBER'
FNUM DB ?
STR2 DB ' AND '
SNUM DB ?
STR3 DB ' IS '
ANS DB ?
STR4 DB ' $'
.CODE
MAIN PROC
MOV AX, "at" DATA PLEASE NOTE: your "at" need to be in symbol
MOV DS,AX It is because this text editor who allow the sub-
mission of this answer if i use the symbol format
MOV AH,2 that is why put it in bold and parenthesis
MOV DL,3FH
INT 21H
MOV AH,1
INT 21H
MOV BL,AL
MOV FNUM,AL
INT 21H
MOV SNUM,AL
ADD BL,AL
SUB BL,30H
MOV ANS,BL
MOV AH,9
LEA DX,STR1
INT 21H
MOV AH,4CH
INT 21H
MAIN ENDP
END MAIN
Becky's mom is a nurse and is required to wear specific clothing to work. This clothing is called
a uniform
business casual
casual
formal business attire
Many electronic devices use a(n) ?, which contains all the circuit parts in a miniature form.
Answer:
An integrated circuit is a single, miniature circuit with many electronically connected components etched onto a small piece of silicon or some other semiconductive material. (A semiconductor is a nonmetallic material that can conduct an electric current, but does so rather poorly.)
Explanation:
Many electronic devices use a(n) integrated circuit which contains all the circuit parts in a miniature form.
The use of integrated circuit is known to be a kind of a single, miniature circuit that has a lot of electronically connected parts that are designed onto a small piece of silicon or semi conductive material.
A lot of electronic components are known to be capacitors, inductors, resistors, diodes, transistors and others.
Learn more about electronic devices from
https://brainly.com/question/11314884
Multiple Choice
Which method adds an element at the beginning of a deque?
appendleft
O insertleft
O popleft
addleft
Answer: appendleft
Explanation: Edge 2021
The method that adds an element for the information at the beginning of a deque is append left. Thus option (A) is correct.
What is an information?An information refers to something that has the power to inform. At the most fundamental level information pertains to the interpretation of that which may be sensed.
The digital signals and other data use discrete signs or alogrithms to convey information, other phenomena and artifacts such as analog signals, poems, pictures, music or other sounds, and the electrical currents convey information in a more continuous form.
Information is not knowledge itself, but its interpretation is important. An Information can be in a raw form or in an structured form as data. The information available through a collection of data may be derived by analysis by expert analysts in their domain.
Learn more about information here:
brainly.com/question/27798920
#SPJ5
Gabby needs to perform regular computer maintenance. What should she do? Check all that apply.
Answer:
all of them but B
Explanation:
Correct on edge
As an interviewer, it is not necessary to be at eye level with interviewee
True
False
Answer:
True
Explanation:
Have a great day
Answer:
True
Hope this helps
If you wanted to make the system sequentially consistent, what are the key constrains you need to impose
Answer:
The call of instructions and data must be sequential, there can be no reordering of instructions but to allow reordering, a fence must be created.
Explanation:
Sequential consistent memory model is able to use instructions when or before processing is done and after processing, so long as the instruction order is sequential.
This is similar to uploading a video on you-tube, the site immediately creates a page for the video even before the video is fully uploaded. Sent tweeter messages are seen by different people at different times, but the messages appear to be arranged sequentially.
Consider a Dog class and a Mammal class. Which is true? Group of answer choices The Dog class is abstract The Mammal class is concrete Both classes are concrete The Mammal class is abstract
Mammals include mammals having hair, udders used to suckle infants having milk, a stomach, four bones in the eardrum, and a jaw bone built up of a single set of bones which clarifies with the skull uniquely.
This will be an abstract class with some functions that aren't declared, and their functions can be declared in the given class, which would be a dog class. The statement that a mammalian is an abstract class is true because the dog class is a mammal.Therefore, the answer is the last choice "Mammal is an abstract class".
Learn more:
brainly.com/question/14137031
What is this screen called? (I attached a picture)
A. Y Editor Screen
B. Graph Screen
C. Window Screen
D. Table Screen
Answer:
graph screen is the correct answer
Answer:
a
Explanation:
Files can be stored on hard drives, network drives, or external drives, but not in the cloud.
True
False
Folders provide a method for organizing files.
True
False
Answer: (1) False, (2) True
Explanation:
What are url addresses for visiting websites? And what are the different parts of a URL? Answer it in a 1-2 paragraph
Answer:
Please read explanation
Explanation:
URL is the short form for "Uniform Resource Locator". A uniform resource locator tells the location of a website to the browser.
Parts of URL:
There are three main parts of URL
ProtocolDomain nameExtensionProtocol defines the type of protocol used for communicating with the website while the domain name is the name assigned to the IP address and the mapping is stored in domain name server and extension tells the type of website i.e.
.com means commercial
.org means non-profitable organization
.edu means educational website
An additional element is path which change with the website navigation.
how to play here!!!!!!!!!!!
Answer:
what?
Explanation:
whaaattt????????????
Answer:
Choose a platform: Playing video games no longer requires a deicated console or a gaming computer
Explanation:
Choose the correct statement(s) regarding ICMP:______.
a. ICMP does not make IP a reliable protocol
b. ICMP is used to convey issues impacting network operations
c. ICMP information is useful in making routing decisions
d. All of the above
Answer:
d. All of the above
Explanation:
ICMP which is fully known as INTERNET CONTROL MESSAGE PROTOCOL can be defined as a protocol which enables the internet to work smoothly and perfectly reason been that they help to create error messages in a situation where internet network problems does not allow Internet protocol packets to get through which is why INTERNET CONTROL MESSAGE PROTOCOL are often use to help solve a problem or to help determine a problem to an issue because they do gives a feedback in a situation where things go wrong on the Internet.
What kind of number is 36A
xbox one is not turning on and power brick is orange why is that?
Answer:
the power supply is working fine but has been set to energy-saving power mode.
Explanation:
A steady orange light on the power brick means that the power supply is working fine but has been set to energy-saving power mode. This happens as a safety precaution when a power surge is detected. In order to fix this, you must first unplug the power brick from both the Xbox one and the wall socket. Next, you have to leave the power brick disconnected for about 30 seconds to a minute so that the energy completely fades. Finally, plug back in the cable and restart your console. It should now have a steady white light and be back to functioning perfectly.
You need to implement a class that represents the state of a room or game section. The class will contain a room_id, a description, and possibly a choice1 and a choice 2. You will need to implement the __str__ override to output the state of the room. You should also implement a method called game_over. If the room does have a choice 1 and choice2 then the game is over and it should return True.
Answer:
class Home(object):
def __int__(self):
room1()
# room1 is the bedroom, you could either sleep or leave the room
def room1(self):
print("Room 1")
choices = ['sleep', 'leave']
for _ in iter(list, 0):
mychoice = input("What do you want to do here sleep/leave: ")
if mychoice == choice[0]:
print("You are sleeping")
elif mychoice == choice[1]:
self. room2()
else:
self. game_over()
# room2 is the living room for fun and recreation
def room2(self):
print("Room 2")
choices = ['watch a movie', 'dance', 'call a friend', 'leave']
mychoice = input("What do you want to do here: ")
for _ in iter(list,0):
if mychoice == choice[0]:
print("I love this movie")
elif mychoice == choice[1]:
print("You are a good dancer.")
elif mychoice == choice[2]:
self. room1()
else:
self. game_over()
# this method ends the program
def game_over(self):
quit()
Explanation:
The simple python object oriented program defines class with three methods room1, room2 and game_over which are all linked from the __init__ method from where the room1 is call first.
To prevent long page load times for pages containing images, it is best to use a compressed file format such as JPG, as well as appropriate image dimensions and
resolution.
magnification.
orientation.
colors.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The given options to this question are:
resolution. magnification. orientation. colors.The correct option to this question is 1. i.e.
Resolution.
The resolution of an image determines how many pixels per inch an image contains. Image having a higher resolution takes long page load times for a page and lower resolution takes less page load time. So, to prevent long page load times for pages containing images, it is best to use compressed file formation as well as appropriate image dimension and resolution.
While other options are not correct because:
Magnification, orientation, and color does not affect the page load time. Page load time for images only affected by the dimension and resolution of the images.
Answer:
B C E
A web page is taking too long to load. It contains only a small amount of text and two images. Choose all items that represent possible causes.
large font size
images do not use a compressed format like JPG
image resolution too high
image resolution too low
image dimensions too large
NEED HALP ASAP!!!
giving out brainiest
What does output allow a computer to do?
O Display information
O Receive information
B
Do complex math problems
Do math problems quickly
Answer:number one
number one
Explanation:
Answer:
a
Explanation:
What is the formula for total current in a series circuit?
Answer:
Series Circuit Diagram and Formula
This means you can calculate current using V = I/R in which R is 18 Ω and V is 9 V to get a current I of 162 A (amps)
Explanation: