You are approached by the representative of a company which sells equipment that
your company makes use of. During your conversation, the company representative
offers to provide one unit of the equipment for your individual home usage for free (i.e.,
as a gift) should you purchase 1000 units for company usage. What should you do?

Answers

Answer 1

Answer: Don't purchase.

Explanation:

I think that is the right thing to do. Don't get swayed by bribes or gifts because that is what a person with integrity does. Of course, if you ask your company if they're willing to buy, then buy it.


Related Questions

Question 3 of 25
What does the number of hertz measure in a CPU?
A. How quickly the data in RAM can be read, changed, and
overwritten
B. How fast a CPU can process data, indicating performance
O c. How many bits are fed into a CPU in a certain amount of time
D. How much data is stored magnetically and is used for long-term

Answers

B as clock speed measures the amount of fetch-decode-excute cycles per second, or the amount of data processed per second measure in GHz.

How fast a CPU can process data, indicating performance does the number of hertz measure in a CPU. Hence, option B is correct.

What is process data?

Process data is information about a business process that builds up in an XML document during the course of the process, in accordance with configured instructions in the BPML.

a stock trading program that creates a straightforward graph from millions of stock data points. Customers' search histories are used by an online retailer to suggest related products. A digital marketing company develops location-specific ads using demographic information about consumers.

Batch processing, real-time processing, and online processing are the models. Data processing that is done in batches is known as batch processing. This indicates that each item of data is processed separately.

Thus, option B is correct.

For more information about process data, click here:

https://brainly.com/question/30094947

#SPJ2

Comments are used to create a pseudocode plan.

Which line below is a comment?


print the average
print the average

print the average
print the average

print the average
print the average

print the average
print the average

Answers

The pseudocode plan line that is a comment is:

print the averageprint the average

What is a pseudocode?

Pseudocode is known to be a kind of man made and informal type of language that is used by a lot of programmers to create algorithms.

Note that the Pseudocode is said to "text-based" as in the case above as it is made up of algorithmic design tool. The rules of Pseudocode are known to be straightforward such as print the average.

Learn more about pseudocode from

#SPJ1

....................

Answers

Answer:

What s this question about?

Explanation:

I will edit my answer but i need to understand what you want me to write about.

30 POINTS!

Which of the following describes an iteration in a computer program?

a set of instructions that causes a number to be printed

a set of instructions that causes the program to stop running

a set of instructions that can be executed multiple times

a set of instructions that does not execute any code​

Answers

The option that describes an iteration in a computer program is a set of instructions that can be executed multiple times.

What tells about an iteration in a computer program?

In computer programming, the term iterative is known to be the act where product design or its application is made better via consistent review and testing.

Therefore saying that The option that describes an iteration in a computer program is a set of instructions that can be executed multiple times is correct.

Learn more about iteration from

https://brainly.com/question/25754804

#SPJ1

Answer:

C. a set of instructions that can be executed multiple times

Explanation:

CIS261: Python Programming I home
>
6.8: LAB: Miles to track laps

Answers

Python Programming Language is known to be a widely used general purpose high level language.

What is Computer Programming?

This is known to be the way or method that is used in writing of a set of instructions that helps to inform the computer on what to do.

Note that in CIS261: Object Oriented Computer Programming, the  computer program is made up of instructions that are said to be executing only one at a time.

Its basic  instruction types is known to composed of input, process, and output.

Learn more about Python Programming from

https://brainly.com/question/26497128

#SPJ1

What is the output?
>>> answer = "five times"
>>> answer[2:7]

Answers

The output  is The string answer = "five times" All strings start at index 0 and end at the length of the string minus 1.

What is output?

Other answer are:

Then count rightly, index 2 is v and index 7 is  m answer[2:7] goes from v to m including v but not m, So, answer[2:7] = "ve ti".

Output is said to be the act of making something out of another thing.

Note that the output  is The string answer = "five times" All strings start at index 0 and end at the length of the string minus 1. Then count rightly, index 2 is v and index 7 is  m answer[2:7] goes from v to m including v but not m, So, answer[2:7] = "ve ti".

Learn more about output from

https://brainly.com/question/1786465

#SPJ1

Does anyone knows What does Array.ContainsValue (namelist, "John") do to the program

Answers

Answer:

It checks to see if an array contains a value called John inside the container named name list.

AUPs ensure that an organization’s network and internet are not abused. Select 3 options that describe AUPs.

connecting to unauthorized devices through the network

going onto unauthorized sites or downloading certain content

not sending spam or junk emails to anyone

not using the service to violate any law

reporting any attempt to break into one’s account

Answers

AUPs often involves not going onto unauthorized sites or downloading certain content, not using the service to violate any law, and not connecting to unauthorized devices through the network.

What is AUP?

AUP stands for Acceptable Use Policy, which refers to a policy that regulates users when they access a corporate newtork.

How does an AUP regulates users?

Most AUPs imply:

Users can only access certain sites and dowloading specific content is forbidden.The access to the internet or network cannot be used for criminal purposes.Only authorized users can connect to the corporate network.

Learn more about AUP in: https://brainly.com/question/9509517

#SPJ1

Answer:

not sending spam or junk emails to anyone

not using the service to violate any law

reporting any attempt to break into one’s account

Explanation:

Which best describes external hardware?

Answers

Answer:

Peripherals

Explanation:

devices used to interact with the computer. External hardware devices include monitors, keyboards, mice, printers, and scanners.

When replacing a system board for an OEM system, what are the recommended steps to take? Select two options that apply.

Answers

When replacing a system board for an OEM system, the recommended steps are A. Run Easy Restore to install the OEM ID. If Easy Restore fails, manually reinstall the OEM ID module while the manufacturing mode is still enabled/detected on the replaced system board.

B. Replace the system board, verify the server boots fully before reinstalling the OEM identity (ID) module.

What is OEM system?

OEM means original equipment manufactures. OEM makes computer system and products that are used by another company's end product.

Thus, the correct options are A and B.

Learn more about OEM system

https://brainly.com/question/23988969

#SPJ1

Please help its timed! Which of the following is an event? Select 4 options. adding three and four in a program. moving a mouse. clicking a mouse button. a sensor detecting the motion of an earthquake detector. scanning a credit card when you shop? ​

Answers

The option that is an event is known to be clicking a mouse button.

What is a computer event?

An event, in a computing context, is known to be any kind of action that aim to know or  is identified by a program and has a good importance for system hardware or software.

Events  examples  keystrokes and mouse clicks, program loading and others. so we can say that the option that is an event is known to be clicking a mouse button.

Learn more about  program from

https://brainly.com/question/1538272

#SPJ1

An example of a processing device would be

Answers

Answer:

Central processing unit (CPU) Graphics processing unit (GPU) Motherboard. Network card.

Explanation:

as my study I know this answer I hope it will be help full

Network card, Graphics processing unit, Motherboard, Central Processing unit, Digital Signal Processor, the list goes on.

Create a future concept on how technology will affect communication and on how the way humans will interact with each other

Answers

Technology making communication increasingly direct and fast, which can impact the way work is carried out and career development.

How does technology affect the job market?

The speed with which communication processes are developed from technological tools, such as the internet, may increasingly impact commercial relations between different nations, in addition to generating more and more automation of tasks and reduction of the physical structures of companies.

Therefore, future projections for technology are related to innovation and profitable and competitive advantages, as in remote work, which is a trend that reduces costs and increases motivation.

Find out more about remot work here:

https://brainly.com/question/26512743

#SPJ1

You wrote a program to allow the user to guess a number. Complete the code. (Coding program: Python) (20 points!)

Answers

Answer:

guess=int(guess)

Explanation:

This is to make the input number an integer so you can compare later on

Answer:

guess = int(guess)

Explanation:

This makes the guess input number an integer

Database queries is an example of

Answers

Answer:

A query in a database is a request for information stored within a database management system (DBMS), which is the software program that maintains data.

SQL(Structured Query Language ( is a standard language for storing, manipulating, and retrieving data in database.

Five types of SQL queries are:

1) Data Definition Language (DDL).

used to define and modify the structure of a database.

2) Data Manipulation Language (DML).

used to manipulate (change) the data in the database.

3) Data Control Language(DCL).

used for access control and permission management for users in the database.

4) Transaction Control Language(TCL).

used for maintaining consistency of the database and for the management of transactions made by the DML commands.

5) Data Query Language (DQL).

used for performing queries on the data within schema objects.

2.
Select the correct answer.
Consider the following statements:
Pls "It is hot."
Q is "It is dry."
Ris "I am thirsty."
What does the sentence (P^Q)->R mean?
Ο Α.
If it is hot and dry, then I am thirsty.
B.
If I am thirsty and dry, then it is hot.
C.
If it is dry or hot, then I am thirsty.
OD.
If it is hot then I am dry and thirsty.

Answers

The structure argument can be given as, with dry and hot weather, it felt thirsty. Thus, option A is correct.

What is the structure of the argument?

The argument is held valid and correct with the use of proper relationships between the sentences. The correct correlation depicts the conclusion to the sentence.

P Q means P followed by Q~R means excluding RP^Q means P and Q

From the given argumentative sentences it can be delivered as If it is dry and hot then I’m thirsty. Thus, option A is correct.

Learn more about structure of argument, here:

https://brainly.com/question/14993040

#SPJ1

give an example of an algorithm in c++ that can be used to avoid car collision using four infra red sensors

Answers

Answer:

Since entering the 21st century, the number of vehicles has increased exponentially, and the number of vehicles and drivers has further increased [1]. How to reduce the number of traffic accident deaths and economic losses has become an important issue in the context of such a large number of vehicles [2].

In recent years, some research studies have been made on the collision warning algorithm. The existing collision warning algorithms are mainly divided into two categories, namely, the Safety Time Algorithm and the Safety Distance Algorithm [3]. The safety time logic algorithm compares the collision time between the two workshops with the safety time threshold to determine the safety status. The safety time algorithm mainly uses Time to Collision (TTC) as the research object [4]. The safety distance model refers to the minimum distance between the vehicle and the obstacle, which is also the distance the vehicle needs to maintain to avoid the collision with the obstacle under the current conditions of the vehicle [5].

Explanation:

How many characters can be store on a disk with a capacity of 1.4mb

Answers

Answer: If you want an exact number of characters, this one is really peculiar. A 1.44MB diskette can hold 1.44 x 1000 x 1024 characters, which is 1,474,560 characters.

Explanation:

HELP ME PASS!
Type the correct answer in the box. Spell all words correctly.
Nathan is creating a presentation for the employees at his office. Which media element should he use in the navigational buttons and menus in his presentation?
Nathan should use text or BLANK elements for the navigational buttons and menus in his presentation.

Answers

Nathan should use text or or  Action button elements for the navigational buttons and menus in his presentation.

What is an Action Button?

An action button is known to be an object that can be seen on a slide that helps one to be able to clicked or pointed to anything on a presentation.

Note that they are often used in self-running presentations and as such, Nathan should use text or or  Action button elements for the navigational buttons and menus in his presentation.

Learn more about presentation from

https://brainly.com/question/24653274

#SPJ1

Which page does a site map usually begin with?
A.shop Page B.Home page C.Index page D.About Page

Answers

Answer:

home page

Explanation:

a sitemap is a file where you provide information about the pages, videos, and other files on your site, and the relationships between them

c. What are the four basic operations in a computer? Define each of them wit help of block diagram.

Answers

Answer:Answer: At a fundamental level, computers operate through these four functions: input, output, processing, and storage.

Explanation:  Input is something entered into a machine or other system, the act of entering data or other information, or input can also describe giving one's help, advice or thoughts.

Output is defined as the act of producing something, the amount of something that is produced or the process in which something is delivered.

An example of process is the steps taken by someone to clean a kitchen. An example of process is a collection of action items to be decided on by government committees. noun.

A storage device is any type of computing hardware that is used for storing, porting or extracting data files and objects.

Explanation:

What was Ada Lovelace's contribution to computer science?

Answers

Answer:

She made the first computer.

Explanation:

Augusta Ada King, Countess of Lovelace (née Byron; 10 December 1815 – 27 November 1852) was an English mathematician and writer, chiefly known for her work on Charles Babbage 's proposed mechanical general-purpose computer, the Analytical Engine.

Answer:

She made the first ever computer.

Explanation:

The computer was called the Analytical Engine.

Walter and Layla own neighboring cornfields. Walter harvested 5/8 of an acre of corn on Monday and Layla harvested 3/8 of an acre. How many more acres did Walter harvest than Layla?

Answers

Answer:

2/8 or if you have to reduce it, you could do 1/4

Explanation:

Walter = 5/8 on Monday

And

Layla harvested = 3/8

So you just do

5/8 - 3/8 = 2/8

You can check it by doing 2/8 + 3/8 = 5/8

С

List three examples of deadlocks
that
are not related to Computer
system.

Answers

Answer:

Hope it helps

Explanation:

The three examples of deadlocks that are not related to a computer-system environment are as given below: Two cars crossing a single lane bridge from opposite directions. A person going down a ladder while another person is climbing up the ladder. Two trains traveling toward each other on the same track.

Maria notices that visitors are landing on her site's home page, but they are not
navigating to any of the other pages. It's possible that having her navigation bar in a
non-standard location could be the cause of this.
Choose the answer.
True
False

Answers

Answer:

True

Explanation:

If your navigation bar is inaccessible, then visitors won't be able to navigate any further into your website.

Question 9
The district purchases a web resource for the elementary campuses, but you
want to use it with your 9th grade students who need remediation. This would be
allowed because the district has extra licenses.
O True
False?

Answers

i think this is false im not sure tho

The first generation computers are likely to have been inverted in what period?

A. 1910s

B. 1920s

C. 1930s

D. 1940s

Answers

The first generation computers are likely to have been inverted in the period of the  1940s.

What is the era in 1st generation of computer?

The era is known to be around 1940-1956. This is said to be the period where the first set of computers were made.

Note that the first generation is one that vacuum tubes as the basic parts for memory and thus The first generation computers are likely to have been inverted in the period of the  1940s.

Learn more about  first generation computers  from

https://brainly.com/question/14713070

#SPJ1

In the event of a fire, the most appropriate failure policy is a policy.​

Answers

In the event of a fire, the most appropriate failure policy is Fail open policy.​

What is fail open policy?

A system set to fail open does not shut down when failure conditions are present. Instead, the system remains “open” and operations continue as if the system were not even in place. This strategy is used when access is deemed more important than authentication.

Fail Open systems allow access as opposed to Fail Closed systems that block access. When handling errors, developers need to carefully choose what actions to take.

Learn more about fire policies here,

https://brainly.com/question/15020213\

#SPJ1

write three questions you have about jow geography shapes economic activies in Australia and the pacific…

Answers

Answer:

Are the trades gonna be harder or easier?

How did geography shape conomic activies in Australia and the pacific?

How did the land get seperated?

ps im not good with these kind of stuff dk y u chose me to do it

How do the following technologies help you with your quest to become a digital citizen kiosks enterprise computing, natural language processing, robotics and virtual reality

Answers

Answer:

How could be an individual become a digital citizens?

Skills such as self-advocacy, conflict resolution, anger management, and decision-making skills, as well as the ability to use assertiveness, resistance, and refusal techniques, are also included and can help students respond safely and effectively online

Explanation:

SAlamat po pa rate nalang

Other Questions
Nick uses marijuana. Nicks parents and friends complain that he is irritable. Nick has noticed that he is forgetful and not motivated to do his best and is concerned that marijuana is interfering with his life. The most healthful thing Nick could do in this situation isA .Consider this a phase of his life that will passB. Ask his friends to leave him aloneC. Drink alcohol instead of smoking marijuanaD. Ask his parents for help Ivan bought a suit on sale for $152. This price was 60% less than the original price.What was the original price? Name the following carboxylic acid:COOHA. 3-ethyl-2-methylheptanoic acidB. 2-ethyl-1-methylhexanoic acid a bicyclist rides 25 miles every 2 hours during race which equation represents the relationship between the number of miles and the number of hours of the bicyclist rides? let x represent the number of hours and let y represent the number of miles? During the Depression, what was the relationship between African Americans' health and African Americans' standard of living?Select the best answer from the choices provided.OA Black people's health decreased with the black family's standard of livingOB. Black people's health increased with the black family's standard of livingOC No correlation existed between the two.OD.Neither of the two shifted much during the Great Depression. Consider the following shape. Find the value of x. Round your answer to two decimal places. witch innovation is attributed to Geoffrey Chaucer? Need Help please 3rd time posting this. In the whole number 70,819 the place value of the digit 1 is Find the sum of 2/3 and its additive inverse three times the sum of x and y is increased by 5 Suppose that y varies inversely with x where x=4 and y=5. Solve for the constantk and find the value of y when x=11 One form of energy can transform into another form of energy.17 Energy in a flashlight's battery changes from ________ energy to electrical energy. Question: Write an equation for this.You have total 100 coinsthat consist of 50 centsand 10 cents. The totalmoney is 34 dollar. Find thenumber of the 50 centcoin. what is the measurement of angle B One container of lemonade mix weighs 2.33 kilograms. How much will 7 containers weigh? emergency!! Write the function f(x)=x 25x in the form f(x) = a(x - h)? +k. Identify the vertex. you take out a cash advance of Below are the steps for writing a critical essay:Write the first draft.Find evidence.Revise draft.Know the text.Outline.Write final essay.Select the topic.Put the steps in correct order. Natalia makes $17.82 per hour, and is expecting to receive a 10% increase in pay. What can Natalia expect her future hourly rate to be?