what are work incidents/situations or ethical problem?

Answers

Answer 1

5 Common Ethical Issues in the Workplace

Unethical Leadership.

Toxic Workplace Culture.

Discrimination and Harassment.

Unrealistic and Conflicting Goals.

Questionable Use of Company Technology.

Answer 2
Jfsnu vnjdjsmamsnsndjxmxnhsc e

Related Questions

PLS HELP! WILL MARK BRAINLIEST!!! Fiona's favorite camera allows her to view, compose, and focus her subject through
the lens, which means she sees her picture through the frame. She can also switch
out the lens for more control of elements like distance, overall focus, and brightness,
and she enjoys how the camera functions well on an automatic setting.
What type of
camera is likely Fiona's favorite based on this description?
1. point & shoot
2. digital single lens reflex (DSLR)
3. ILC
4. hybrid camera

Answers

The type of  camera which is likely Fiona's favorite based on the above description is: 2. digital single lens reflex (DSLR).

A camera can be defined as an optical, electronic device that has an aperture fitted with a lens and a shutter for recording and capturing visual images.

Generally, there are different types of camera and these include:

Point and shootHybrid cameraInterchangeable lens camera (ILC)Bridge camerasMirrorless camerasDigital single lens reflex (DSLR)

A digital single lens reflex (DSLR) is designed to combine the operational mechanism and optics of both a single lens reflex camera and a digital imaging sensor. Thus, a digital single lens reflex (DSLR) can be used for the following:

1. Seeing your pictures through the frame.

2. To control visual elements such as distance, overall focus, and brightness.

Read more on DSLR here: https://brainly.com/question/25884751

what is good work ethic?​

Answers

Answer:

A strong work ethic is an important part of being successful in your career. Work ethic is a set of values based on the ideals of discipline and hard work. ... Forming good habits such as focusing, staying motivated, finishing tasks immediately, and more helps to create a good work ethic that will impress employers.

Explanation:

HOPE IT HELPS

Write a recursive function encode that takes two Strings as an input. The first String is the message
to be encoded and the second String is the key that will be used to encode the message. The function
should check if the key and message are of equal length. If they are not the function must return the
string “Key length mismatch!”. How do I write this

Answers

Answer:

68hm

Explanation:

gdhdhdhfhfhrkiduv

consider 4 jobs arriving in ready queue in the same order at time =0 if BT requirements of these jobs are 4,1,8,1 respectively what is completion time of p1 assuming round robin with TQ =1

Answers

Answer:tq we

Explanation:

t rhh

identify the data type and the conversation specification of the given constant '100.75'

Answers

Answer:

primitive data type

Explanation:

please mark me as brainlest

The data type and the conversation specification of the given constant '100.75' is a Floating-point.

What is a Floating-point?

This is known to be a data type that is made up of number that has a decimal point. For example 111.75

Conclusively, Note that the Floating-point can be shown to have slower and less correct and they can be used for a larger amount of numbers and thus the data type and the conversation specification of the given constant '100.75' is a Floating-point.

Learn more about  data type from

https://brainly.com/question/179886

#SPJ2

You text file begins with the following rows. The pattern is a description of the item to be repaired, its color, and the issue. bike, red, flat tire bike, blue, broken chain skate, blue, loose wheel mitt, red, torn lace Your program starts with the following lines. import csv aFile = open("data\broken.txt","r") aReader = csv.reader(aFile) countRed = 0 for item in aReader: When you write code to count the number of times red is the color, what is the index of "red"?

Answers

Answer: the answer is 1

Explanation:

edge 2021

cuales son las caracteristicas principales del AMD Ryzen 5 5600X 3.7GHz ,Nfortec Lynx Cristal Templado USB 3.0 RGB Blanco , Asus PRIME B450M-A II , Corsair Vengeance RGB Pro Optimizado AMD DDR4 3200 16GB 2x8GB CL16 , Kingston FURY Beast DDR4 3200 MHz 16GB 2x8GB CL16, MSI GeForce GT 730 Low Profile 2GB GDDR3 , LG 24MP59G-P 24" LED Full HD IPS,Logitech Wireless Combo MK270 Teclado Inalámbrico
Recíbelo mañana , Tempest MS-300 RGB Soldier Ratón Gaming 4000DPI , Asus PCE-AC51 Adaptador Inalámbrico PCI-e AC750 , Creative Sound Blaster Play! 3 Tarjeta de Sonido USB, Kioxia EXCERIA 480GB SSD SATA y Tempest Gaming GPSU Fuente de Alimentación 750W?

Answers

It’s 300 gb for gta 5 and gta rp and then the internet and I don’t want it

What type of data causes concern for institutions or business when collected, stored, and not secured prope
Advertising information
Personal identifying Information
User interface information
Marketing information

Answers

The type of data which causes concern for institutions or business when collected, stored, and not secured properly is: B. Personal Identifying Information.

A personal identifying information (PII) can be defined as any representation of data or information that can be used to identify the specific identity of an individual.

Basically, a personal identifying information (PII) is an information that permits the specific identity of an individual to whom the information is ascribed or attributed.

Some examples of a personal identifying information (PII) include the following:

Social security number (SSN).E-mail address.Driver's license number.Bank account number.Full name.Passport number.

As a general rule, it is very important and essential that institutions or business organizations that are in possession of personal identifying information (PII) should secure them properly, in order to avoid data breach or unauthorized access by hackers.

Read more: https://brainly.com/question/4997276?referrer=searchResults

What are the major prevention measures of a computer virus?​

Answers

Answer:

use a firewall as well as a strong password

Write a Boolean function named isPrime which takes an integer as an argument and returns true if the argument is a prime number, or false otherwise. Use the function in a program that prompts the user to enter a number then displays a message indicating whether the number is prime.

Answers

Answer:

public static lotsof verbosekrap(String args[]) {

int num;

printf("Enter this nonsense BF: ");

scanf("%d", &num);

isPrime(num);

}

public boolean isPrime(int num) {

      if (num == prime) {

        returns true;

       } else {

        returns "your mom sucks and fails";

}

Explanation:

this is a mix of C and Java, I don't care

Match the TCP/IP Layer to a problem that can happen there.

1. Mistyped address
Internet layer
2. Packets fail to arrive
application layer
3. Server not found
transport layer

Answers

Answer:

server not found transport layer

Answer:

2 Transport layer

3 Internet layer

1 Application layer

Explanation:

because i got it right

Opportunity for advancement is which rewards of work factor?
O Affiliation
O Benefits
O Career
O Compensation

Answers

Answer: Affiliation

This answer is the most logical to me.

Hope this helps have a nice day :)

Answer: benefits

Explanation:

if you are going to develop a special computer, what would it be and explain it's purpose.​

Answers

Answer:

It would be to figure out what cancers someone could exactly so no need for a biopsy

______ provide visual representations of the options available for a given command

Answers

The visual representations is provided by the Gallery in the computer system.

Basically, gallery means the collection of pictures in a Computer.

Gallery is what enables systematic display and the management of distinct images in the computer.

A very good illustration is use of Clipart images. It is a ready made picture gallery available in the computer.

Every function on computer are represented with an icon, the icon images are enable through the Gallery.

In conclusion, the Visual representations of the options available for a given command is provided by the Gallery.

Read more about Gallery here

brainly.com/question/2946480

Please help



Due at 11:59

Answers

Answer:

1) IDEAL First Step: Identify

You need to get to the bottom of the issue, not play the blame game.

Have your team members (perhaps after a team-building game like #7) write all the causes they can think of on a large white board. Go through them one-by-one, asking one question: what caused this cause?

By backtracking to the ultimate root cause, you create a solid foundation for further discussion.

Explanation:

Answer:

a silly problem would be the problem of me not wanting to give an answer. how would you solve that problem.

Explanation:

what are the characteristics of computer. Explain any one​

Answers

Answer:

Your answer will be on the picture above..

Explanation:

Hope it helps you..

Y-your welcome in advance..

(;ŏ﹏ŏ)(ㆁωㆁ)

1.High speed
2. Accuracy
3. Diligence
4. Versatility
Any one is explained below:-
.Accuracy:-
A computer is an accurate machine. It doesn’t make any mistake. If the inputted data are correct, it always gives correct output. Sometimes, It may give undesirable output which is due to wrong input data and this term is considered as GIGO( Garbage In Garbage Out)

Bias in the development of computational artifacts often arises from _____. Select 2 options.

testing software


conscious bias


including outliers


unconscious stereotyping


accurate data

Answers

Answer:

concious bias

unconciscous sterotyping

Explanation:

The bias in computational artifacts results in conscious bias and unconscious stereotyping. Thus, options A and C are correct.

What is a bias in technology?

A bias in technology is given as the developed system of the systematic and repeatable errors that makes the formation of the unfair outcomes. The development of the working outcomes formed is responsible for the development of the inappropriate function of linked processes.

The development of the bias in the computational artifacts is found to be the result of conscious bias and unconscious stereotyping. Thus, options A and C are correct.

Learn more about bias, here:

https://brainly.com/question/13044778

#SPJ2

could use the help! ​

Answers

Answer:

Chuckie breathed defends

Output devices allow the user to enter information into the system or control its operation.
True or False

Answers

Output devices allow the user to enter information into the system or control its operation: False.

A computer can be defined as an electronic device that is designed and developed to receive data (instructions) in raw form as an input, and then processes these data into an information (output) that is usable by an end user.

Basically, the main parts or components of a computer include the following;

Central processing unit (CPU): this is the brain of a computer and it does all the processing and logical control.Input devices: they are used for entering data or information into a system. Some examples of input devices are keyboard, mouse, scanner, etc.Motherboard: this is the circuitry upon which other components are installed.Output devices: they are used for displaying the processed information from a system. Some examples of output devices are printer, monitor, speaker, etc.

For instance, an end user can use a keyboard as an input device to enter commands or type textual information on a computer system.

Also, a mouse is an input device that can be used by an end user to select one or more time on a computer system.

In conclusion, input devices rather than output devices allow an end user to enter information into a system or control its operation.

Read more: https://brainly.com/question/17402566

What does ATM mean on lego mario mean I know that this is not school related but I trying to help my brother ​

Answers

Answer:

I HAVE NO IDEA-

Explanation:

2
3
4
5
6
9
10
TIME REMAINING
01:34:03
ni
Fill in the blank with the correct response.
The
on the following image
b
link b-quote det ins img ut
ol
li code
more
lookup close tags proofread fullscreen
stands for bolding
text.
Save and Exit
Next
Submit
Mark this and return

Answers

The first one, “b” out of the answers is the correct answer

Remember not to use tools that are ________ in any way.

Answers

Answer (Broken)

The answer is broken because I took the test and it is the most logical answer.

Hope this helps have a nice day :)

Remember not to use tools that are broken in any way. Thus, the correct option for this question is D.

What are tools?

Tools may be defined as any type of instrument or a simple piece of equipment that you hold in your hands and utilized to do a particular kind of work. Some examples of tools may include, spades, hammers, knives, etc.

A tool can be any item that is used to achieve a goal. Equipment usually denotes a set of tools that are used to achieve a specific objective. But prior to their utilization, it is to be remembered that never use tools that are broken by any means.

Therefore, remember not to use tools that are broken in any way. Thus, the correct option for this question is D.

To learn more about Tools, refer to the link:

https://brainly.com/question/25860017

#SPJ2

explain how VPN works and name the 3 VPN protocol

Answers

Explanation:

A VPN hides your IP address by letting the network redirect it through a specially configured remote server run by a VPN host. This means that if you surf online with a VPN, the VPN server becomes the source of your data. This means your Internet Service Provider (ISP) and other third parties cannot see which websites you visit or what data you send and receive online. A VPN works like a filter that turns all your data into "gibberish". Even if someone were to get their hands on your data, it would be useless.

1) PPTP

Point-to-Point Tunneling Protocol

2)) L2TP/IPSec(Layer 2 tunnelling protocol)

3) secure socket tunnelling protocols)

You designed a program to find the average of the user’s numbers.

Which step below corresponds to asking the user for the numbers?

Answers

Answer:

Perform any needed calculations or data manipulations.

Explanation:

Answer:

Perform any needed calculations or data manipulations.

Explanation:

what are The yoshi Themes in super smash bros ultimate

Answers

Answer:

I believe there's Yoshi's Island Brawl, and Yoshi's Island for 3DS/Wii U

Explanation:

Output devices allow the user to enter information into the system or control its operation.
True or False

Answers

Answer:

False.

Explanation:

Write a recursive function encode that takes two Strings as an input. The first String is the message
to be encoded and the second String is the key that will be used to encode the message. The function
should check if the key and message are of equal length. If they are not the function must return the
string “Key length mismatch!” Otherwise the function must get the ASCII value of each character in
the key string and check if it is divisible by 2 if it is then the respective character in the message will be
encoded by getting the ASCII value of that character and adding 5. If corresponding key character it is
not divisible by 2 then 3 is added instead. Can someone help please

Answers

Answer:

85

Explanation:

jdjdjdjfjfjcjjcjrtgtggtfg g hi i

Why would over-50 executives have a harder time buying into the idea of social media?​

Answers

Answer:

Most likely that social media has a large number of user base already and also a large number of social media platforms are already there so it is hard to compete will those big competitors like Discord.

please give brainliest

Someone I had an idea about how to identify any question. so look at this question for instance (no need to answer i have it already):

Students use a microscope to look for structures present in four different cells. The students placed an X for each structure that was viewed for each cell on the table shown. Which cell that was viewed is most likely a prokaryote?

Cell W
Cell X
Cell Y
Cell Z

(the correct answer was cell x)

Alright so how could we identify this? I think I have devised a method!

^charicters|#words|~vowls|-answers|+platform|$subject|
^255|#49|~71|-W/X/Y/Z|+USAtp|$BIO

So basically we only need a little information to identify any question as you can see.
Tell me what you think or if it could become the way to get answers. You could go and fill in the question (^charicters|#words|~vowls|-answers|+platform|$subject|) on website and find the very same question and its answer.

Answers

Answer:

thts really cool

Explanation:

i didnt answer bc u alr have it the reason i answered this is bc i need pts so pls make me brainliest

Consider a byte-addressable computer with 24-bit addresses, a cache capable of storing a
total of 64KB of data, and blocks of 32 bytes. Show the format of a 24-bit memory address for:
(a) Direct mapped
(b) Associative
(c) 4-way set associative

Answers

Answer:

A.

Explanation:

yan Ang sagottt ko yannnnnñnnnnnnnnnnnnn

Other Questions
What is the constant rate of this? The difference between a sonnet and free verse poetry is --A) Free verse poems are fourteen lines long and typically rhyme whereas sonnets have no requirements for length or rhymeB) Free verse poetry never rhymes but all the lines in a sonnet rhyme with eachotherC) Sonnets are 14 lines long and typically rhyme whereas free verse has no rules forlength or rhymeD) Sonnets cannot be written in iambic pentameter but free verse can roman portraits of augustus and patricians utilized a combination of the greek canon and ""verism"" or individualized realism showing the sitters wrinkles and other identifying characteristics. true or false? component of earthing and reasons why each material is being used I need help fast please (will give brainliest for first answer) Indicate YES or NO as to whether the transformation will map hexagon ABCDEF onto itself.A. Reflecting over AC B. Reflecting over BEC. Rotating 120 counterclockwise about point X D. Rotating 240 clockwise about point F Which are common mistakes people make when investing? Choose four answers. They put all of their money into one kind of investment at a time. They divide their funds between more risky and less risky options. They analyze their comfort level with the types of risk they will take. They invest more money than they can afford. They focus heavily on familiar investment opportunities. They hold onto investments longer than they should to recoup losses. -10x + 35 + 5x=-5x + 20 (I need a step by step solving/ Show your work) If a line has slope -4/3 and passes through the point (-3, 7), what is the y-intercept of theline? I'm also stuck on this one! Help! Ayuda con esto vale 7.5% de la nota doy 15 puntos i had 30 yards of fabric. i made 3 dresses and used 2 5/6myards of fabric on each dresses. i also made 4 blouses and used 1 3/5 yards of fabric on each blouse. how much fabric is left? How did President Lyndon B. Johnson advance public education? What was the main goal of the Black Codes? What physical and behavioral adaptations do zebras have that help them evade predators? (Site 1) The graph of y = x2 7x +12 is a parabola with x-intercepts at and a vertex that is the point on the curve. Do you think more foam will form if the ice cream is added to the glass before the root beer or after the root beer? Unscramble the word essrenypGet brainlest of answer is correct Which line segments have a positive slope? This perspective of research was catalyzed by the arrival of computers:O behavioralcognitiveO biologicalO socioculturalQuestion 3pts