a employee who has intregity is

Answers

Answer 1

Answer:

is some one who demonstrates  sound moral and ethical principles ,always does the right thing no matter when or who's watching, they can be trusted around the staff and the stakeholders. which means that that person is honest, fair, and dependable

Explanation:

i actually just did a report for a class that i am taking called human resources

i hoped this helped you


Related Questions

which port does switch0 use to send frames to the host with the ipv4 address 10.1.1.5?

Answers

The ICMP packet is sent out of port 2, where PC3 is located, because the switch discovered the identical destination mac-address in "port 2".

How can I read a MAC address table?Use the show mac-address command to display the MAC table. The Type column in the output of the show mac-address command specifies whether the MAC entry is static or dynamic. Using the static-mac-address command, you can create static entries.The MAC address and port entry that does not belong to PC0 must be the MAC address and port of the destination with the IPv4 address 10.1. 1.5.The ICMP packet is sent out of port 2, where PC3 is located, because the switch discovered the identical destination mac-address in "port 2".The ICMP packet is sent out of port 2, where PC3 is located, because the switch discovered the identical destination mac-address in "port 2".        

To learn more about port refer to:

https://brainly.com/question/28391396

#SPJ4

a file that serves as a starting point for a new document

Answers

Answer:

The appropriate response is "Template".

Explanation:

A template would be a document that might open new opportunities for such a new folder. Because once you launch a framework, that's already pre-formatted sometimes in a manner. This same template will indeed presumably have such identification and phone number environment throughout the upper left, a person receiving identify location somewhat below something on the opposite side, a response body location further below, as well as a signature, identify at either the lower part.

Jeremiah needs to see data in two different table views from two regions without creating two tables. Which two features would he use to create this?

Answers

Answer:

Tables & Filter

Explanation:

That correct

Answer:

D. Tables and filter

Explanation:

1. when is it a good idea to use lossless compression

Answers

A lossless compression algorithm is useful only when we are more likely to compress certain types of files than others; then the algorithm could be designed to compress those types of data better. Thus, the main lesson from the argument is not that one risks big losses, but merely that one cannot always win.




Hope this helped please brainiest

Which of the following expressions evaluate to 3.5 2
I (double) 2 / 4 + 3 II (double) (2 / 4) + 3 III (double) (2 / 4 + 3) A I only
B Ill only C I and II only D II and III only
E I,II, and III

Answers

The expression that evaluates to 3.5 is option A, I only.

To understand why, we need to follow the order of operations. In option I, we first divide 2 by 4, which gives us 0.5. Then we double that, which gives us 1. Finally, we add 3 to 1, which gives us 4. Option II first divides 2 by 4, which again gives us 0.5.

However, before doubling that, we add 3 to it, which gives us 3.5 when we finally double it. Option III looks similar to II, but we have to remember that division comes before addition, so we first add 2/4 and 3, which gives us 3.5. Then we double that, which gives us 7.

Therefore, the correct option is 3.5 is option A, I only.

Learn more about programming:https://brainly.com/question/23275071

#SPJ11

Your question is incomplete but probably the complete question is:

Which of the following expressions evaluates to 3.5?

I. (double) 2 / 4 + 3

II. (double) ( 2 / 4 ) + 3

III. (double) ( 2 / 4 + 3 )

A. I only

B. II only

C. I and II only

D. II and III only

E. I, II, and III

Is the PS5 a W or L? Would you still play on the PS4 more then the Ps5?

Answers

W but PS4 is my favorite

Answer:

HMMM I dont know because if the ps4 has the horizon game then sure but if nit ps5 because that game looks sick

Explanation:

Please answer
9 and 10
Asap

Please answer 9 and 10 Asap

Answers

the answer to you two questions are true and true

after writing pseudocode what step is next

Answers

The next step would be to implement the pseudocode. This means taking the instructions written in the pseudocode and translating it into a programming language, such as C++, Java, or Python.

What is programming language?

A programming language is a special language used to communicate instructions to a computer or other electronic device. It consists of a set of rules and symbols which tell the device what to do . Programming languages are used to create software, websites, mobile applications and more.  

This involves taking each step written in the pseudocode and writing code that will perform the same function. Depending on the complexity of the pseudocode, this could involve writing multiple lines of code for each step. After the code is written, it can then be tested and debugged to ensure that it works properly.

To learn more about programming language

https://brainly.com/question/23959041

#SPJ1

32.
To give an existing document a different name
A. retype and give it another name,
B. use the save command
C. use the same as command
D. use windows explorer to copy.

Answers

Answer:

B.

Explanation:

If you are trying to save an existing document you would use the save command and you will be prompted if you want to rename it to what ever you wish

Hope this helps :)

which is the best software program

Answers

Answer:

The question "which is the best software program" is quite broad, as the answer can depend on the context and what you're specifically looking for in a software program. Software can be developed for a myriad of purposes and tasks, including but not limited to:

- Word processing (e.g., Microsoft Word)

- Spreadsheet management (e.g., Microsoft Excel)

- Graphic design (e.g., Adobe Photoshop)

- Video editing (e.g., Adobe Premiere Pro)

- Programming (e.g., Visual Studio Code)

- 3D modeling and animation (e.g., Autodesk Maya)

- Database management (e.g., MySQL)

- Music production (e.g., Ableton Live)

The "best" software often depends on your specific needs, your budget, your experience level, and your personal preferences. Therefore, it would be helpful if you could provide more details about what kind of software you're interested in, and for what purpose you plan to use it.

What is an advantage of using flash drives for file storage?
1) The files on them can be accessed through the Internet.
2) They are small enough to fit in a pocket.
3) They are built to work with a computer’s internal hard drive.
4) They almost always last forever and never wear out.

Answers

Answer:

2) They are small enough to fit in a pocket.

Explanation:

is this free to ask any question because when i tried to do it it said i have to pay money

Answers

Answer:

Nope, you don't have to pay

Explanation:

All you have to do is create an account. You can have a free account, or you can pay for one, but if you have a free account you can only see so many answers. Then you have to watch an ad to see them. With a paid account you can get all answers without having to watch any ads.

trace the execution of the program above and answer the following questions. a. what is the first character that this program displays? k b. what is the second character that this program displays? r c. what is the third character that this program displays? z d. what is the fourth character that this program displays?

Answers

Information about a program is displayed using the Display Program (DSPPGM) command.

Thus, Information about the compiler, the source from which the program was derived, the processing characteristics of the program, its size, and the number of parameters that must be supplied to the program when it is called are all displayed on the display.

Information about a program is displayed using the Display Program (DSPPGM) command.

Information about the compiler, the source from which the program was derived, the processing characteristics of the program, its size, and the number of parameters that must be supplied to the program when it is called are all displayed on the display.

Thus, Information about a program is displayed using the Display Program (DSPPGM) command.

Learn more about program, refer to the kink:

https://brainly.com/question/11023419

#SPJ1

A Chief Security Officer (CSO) has asked a technician to devise a solution that can detect unauthorized execution privileges from the OS in both executable and data files, and can work in conjunction with proxies or UTM. Which of the following would BEST meet the CSO's requirements?
A. Fuzzing.
B. Sandboxing.
C. Static code analysis.
D. Code review.

Answers

A solution which would best meet the CSO's requirements is: B. Sandboxing.

What is a sandbox?

A sandbox can be defined as an isolated environment in a computer system or on a network that is designed and developed to mimic end user operating system (OS) and environments, so as to detect unauthorized execution privileges from the operating system (OS).

In cybersecurity, sandboxing is typically used to safely execute suspicious code and data files without causing any harm to the host device or network. Also, sandboxing can work in conjunction with proxies or unified threat management (UTM).

Read more on sandboxing here: https://brainly.com/question/25883753

A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should the technician use to reveal the location of the fault?A. OTDRB. Light meterC. Tone generatorD. CSU/DSU

Answers

The technician troubleshooting a point-to-point fiber-optic connection who is at a remote site and has no connectivity to the main site should use an OTDR to reveal the location of the fault. So, the correct option is A.

An Optical Time-Domain Reflectometer (OTDR) is a fiber-optic troubleshooting device that is used to identify faults in fiber-optic cables. The OTDR sends a series of light pulses into the fiber optic cable being tested and then analyses the amount of light reflected back to it. The reflected light is captured by the device and used to determine the location and nature of the fault that caused the light to bounce back.

The OTDR device launches a short pulse of light into a fiber optic cable that is being tested, and then it measures the strength and time of the reflected signals it receives to locate and identify faults in the cable. OTDRs are sophisticated devices that can identify and locate a wide range of faults and problems in fiber optic cables, including broken fibers, splices, and connectors, to name a few.

A light meter is a device that measures the amount of light in an area. A tone generator is a device that produces an audio tone, which can be used to identify and locate faults in a cable. A CSU/DSU (Channel Service Unit/Data Service Unit) is a piece of equipment that is used to connect digital equipment to digital lines, such as T1 or T3 lines.

You can learn more about fiber-optic connection at: brainly.com/question/27780068

#SPJ11

What are some other possible causes of an overheating laptop

Answers

Too much use, air vents are being covered, dust/dirt/other particles clogging the fan making it struggle too cool the laptop down, the internal battery may be low and struggling to function, etc.


I hope this helps you!

given list [40, 85, 68, 41, 77, 97], what is the list after three iterations of the outer loop?

Answers

After three iterations of the outer loop on the given list [40, 85, 68, 41, 77, 97], the resulting list will be [40, 41, 68, 77, 85, 97].

The specific algorithm or operation being performed in the outer loop is not mentioned, so I will assume a sorting algorithm is being used. One commonly used sorting algorithm is the bubble sort. In each iteration of the outer loop, the algorithm compares adjacent elements and swaps them if they are in the wrong order. After three iterations of the outer loop, the largest three elements "bubble" up to their correct positions in the list.

For example, in the first iteration, 85 and 68 are compared and swapped, resulting in [40, 68, 85, 41, 77, 97]. In the second iteration, 85 and 41 are compared and swapped, resulting in [40, 68, 41, 85, 77, 97]. In the third iteration, 85 and 77 are compared and swapped, resulting in the final sorted list [40, 68, 41, 77, 85, 97].

Therefore, after three iterations of the outer loop, the list [40, 85, 68, 41, 77, 97] would be sorted and transformed into [40, 41, 68, 77, 85, 97].

Learn more about iterations here:

https://brainly.com/question/31197563

#SPJ11

what is non verbal communication ?​

Answers

Answer:

Nonverbal communication is the transfer of information through body language, facial expressions, gestures, created space and more.

Explanation:

For example, smiling when you meet someone conveys friendliness, acceptance and openness. Everyone uses nonverbal communication all the time whether they know it or not.

Answer:

Non verbal communication is any communication that doesn't involve words. Instead, it involves body language, such as eye contact, nodding, etc.

Brainliest, please :)

HELP FAST
You see this red line appear below your text as you are typing an email. The red line indicates that you should check for:

red squiggly line


grammar errors
grammar errors

sentence structure errors
sentence structure errors

punctuation errors
punctuation errors

spelling errors
spelling errors

Answers

Answer:

spelling errors and/or punctuation errors

what is text or pictures behind the document called?​

Answers

Answer:

That is called a watermark

What is the earliest age you can collect social security.

Answers

The earliest age to collect is 62

A ____ wavy underline means the flagged text is not in Outlook's main dictionary. A. Red B. Green C. Blue D. Purple. A. Red.

Answers

The correct answer is A. Red. A wavy red underline indicates that the flagged text is not in Outlook's main dictionary.

Explanation: When you compose an email in Outlook, the program automatically checks your spelling and grammar. If Outlook finds a word that is not in its main dictionary, it will underline the word with a wavy red line.

This could happen if you are using a word that is a proper noun, a technical term, or a word that is simply not commonly used in English. If you right-click on the underlined word, you can add it to your custom dictionary so that Outlook will recognize it in the future. This can be helpful if you frequently use industry-specific jargon or other specialized vocabulary.

To learn more about technical click here, brainly.com/question/30469009

#SPJ11

what type of storage system is best suited for a just-in-time environment? question 17 options: zone method floating location central storage point-of-use storage bulk location storage

Answers

The storage system best suited for a just-in-time environment is point-of-use storage. This method allows for efficient access to materials and reduces waste and delays by keeping inventory close to where it is needed in the production process.

The storage system that is best suited for a just-in-time environment is the point-of-use storage system. This system ensures that materials are stored in close proximity to where they will be used, which helps to minimize transportation and handling time. This system is also efficient in terms of inventory management and control, as materials are only ordered and delivered when needed. The other storage systems listed, such as the zone method floating location, central storage, and bulk location storage, are not as efficient in a just-in-time environment as they require more time and effort to manage inventory and transportation.

learn more about point-of-use storage here:

https://brainly.com/question/30141625

#SPJ11

(ATOM)^1/2 =A+TO+M ?
solve the crypto arithmetic problem .

Answers

The solution to the crypto arithmetic problem is A = 3, T = 4, O = 8, and M = 1.

To solve the crypto arithmetic problem (ATOM)^1/2 = A + TO + M, we need to find the values of the letters A, T, O, and M that satisfy the equation. We can start by examining the square root of ATOM. Since the square root of a number has only one digit, it means that the square root of ATOM must be a single-digit number. The only possible values for A are 1, 2, 3, 4, 5, 6, 7, 8, and 9. We can then test different values for A and determine the corresponding values for T, O, and M that make the equation valid. After trying different combinations, we find that A = 3, T = 4, O = 8, and M = 1 satisfy the equation.

Learn more about crypto arithmetic here:

https://brainly.com/question/8986057

#SPJ11

what are the differences between online class and offline class?​

Answers

online class Direct on and compute

Offline class go to school

The main difference between online and offline learning is location. With offline learning, participants are required to travel to the training location, typically a lecture hall, college or classroom. With online learning, on the other hand, the training can be conducted from practically anywhere in the world.

Type the correct answer in the box. Spell all words correctly.
Natasha came across a website that had a building image, where each window in the building was clickable. She clicked on one of the windows,
Upon clicking the link information was sent to another computer. This computer processed the information and returned the appropriate page
about a window. Which attribute is used in this case to identify the type of image map?
The
attribute is used in this case to identify the type of image map.

Answers

Answer:

Redirection

Explanation:

This is something called redirection, you can sometimes get paid for it, or just some sort of reward, sometimes even a virus scanner.

Answer:

The  ismap  attribute is used in this case to identify the type of image map.

Explanation:

Using ismap indicates to your browser that the link is processed by another computer (server). Once the server processes the information about the link, it returns the appropriate page.

How does the brain influence your emotions, thoughts, and values?

Answers

Amygdala. Each hemisphere of the brain has an amygdala, a small, almond-shaped structure. The amygdalae, which are a part of the limbic system, control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" reaction when someone senses a threat.

What are the effects of the brain?Serotonin and dopamine, two neurotransmitters, are used as chemical messengers to carry messages throughout the network. When brain areas get these signals, we recognize things and circumstances, give them emotional values to direct our behavior, and make split-second risk/reward judgments.Amygdala. The amygdala is a small, almond-shaped structure found in each hemisphere of the brain. The limbic systems' amygdalae control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" response when someone perceives a threat.Researchers have demonstrated that a variety of brain regions are involved in processing emotions using MRI cameras. Processing an emotion takes happen in a number of different locations.

To learn more about Amygdala, refer to:

https://brainly.com/question/24171355

#SPJ1

when you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. the receptionist uses a notebook system that is secured to her desk with a cable lock.

Answers

The receptionist uses a notebook system that is secured to her desk with a cable lock so you can relocate the switch to the locked server closet.

What's the function of switch?

The function of a switch in a circuit is to open or close the circuit. Switches are used to turn electrical equipment on or off. In electrical engineering, a switch is an electrical component that can disconnect or connect conductive paths in an electrical circuit and interrupt or redirect current from a conductor. A network switch is a device in a network (computer, printer, wireless access point, etc.) Connect. They can "talk" by exchanging data packets. Switches are both hardware devices that manage physical networks and software-based virtual devices.

Learn more about switch: https://brainly.com/question/12811608

#SPJ4

if you were any type of fnaf charater who would you be and why?

Answers

Answer:

Foxy

Explanation:

Cause he's cool and he's my favorite.

Which two statements are true about the SAFe backlog model? (Choose two.)
A) Epics are in the DevOps Backlog
B) Capabilities are in the Program Backlog
C) Stories are in the Team Backlog
D) Stories are in the Solution Backlog E) Features are in the Program Backlog

Answers

The two statements that are true about the SAFe backlog model are: B) Capabilities are in the Program Backlog, and E) Features are in the Program Backlog.

The SAFe (Scaled Agile Framework) model is based on Lean, Agile, and product development flow principles. The SAFe backlog model is a hierarchical system that connects different layers of planning and execution to achieve an aligned and structured approach to software development. The backlog is a prioritized list of the features, capabilities, and user stories that the team will work on in the future. The SAFe backlog model consists of three types of backlogs: Program Backlog, Team Backlog, and Solution Backlog.

The DevOps backlog is not part of the SAFe backlog model, so statement A is not true. Capabilities are high-level requirements that define a set of features needed to accomplish a business goal or objective. Capabilities are owned by the Agile Release Train (ART) and are included in the Program Backlog, so statement B is true. Features are a set of functionality that delivers value to the customer. Features are included in the Program Backlog, and their size is appropriate for a single iteration, so statement E is true. Stories are specific descriptions of the functionality, and they are used to define the Acceptance Criteria of a feature.

Stories are included in the Team Backlog and represent the work that will be performed in an iteration, so statement C is not true. Solution Backlog is used to manage the work for multiple ARTs and suppliers involved in building a large and complex system. Stories are not part of the Solution Backlog, so statement D is not true.

know more about Program Backlog,

https://brainly.com/question/18650631

#SPJ11

Other Questions
Given: 3x + 1 = -14; Prove: x = -5Statements A escala 1/2/500000 A cuantos kilometros se encuentran dos ciudades que en el mapa estan separados 10cm help pls i need answers The newly incorporated Pet Toy Company (PTC) manufactures multiple products that are sold to a small number of specialty pet stores. One of its product groups is called Boxers. The company uses the weighted average method of process costing.The following information relates to Boxers during the company's first period of operations: Suppose we have collected data on the exam grades and divided them according to gender, with the information contained in the following table: Table 2: Exam grades & gender Males Females number of observations 16 Standard deviation 4.2 2.3 mean 69 63 18 (a) Is there any statistical evidence that the standard deviation of exam grades for male students is larger than the standard deviation of grades for female students? Use a significance level of a = 1%. [35 marks] Conduct a test to assess whether there is a statistically significant difference in the average grades between male and female students. Use a a = 1% significance level. [35 marks] (b) This is typically considered the return on U.S. government bonds and bills and equals the real interest plus the expected inflation premium.? Current Attempt in Progress A company issues $26000000, 5,8%, 20-year bonds to yield 6% on January 1, 2020, Interest is paid on June 30 and December 31. The proceeds from the bonds are $25399015. What is interest expense for 2021, using straight-line amortization? O $1538049 O $1508000 $1488568 O $1524798 huntington's disease is caused by a single dominant allele (h). if one parent has huntington's disease (hh) and the other parent does not. what are the chances their child will inherit huntington's disease? The graph below shows the eye color for a classroom of students. Does glass absorb moisture? find EF given E (-7, -2) and B (11, 3) how do i solve this? Which statement best describes the pH of pure water? It is neutral because the concentration of hydronium ions equals that of hydroxide ions. It is neutral because the pure liquid contains neither hydronium ions nor hydroxide ions. It is acidic because it has a hydronium ion concentration of mc027-1. Jpg. It is basic because it has a hydroxide ion concentration of mc027-2. Jpg. offering brainiest pls HELP!!. Steven has a bag of 20 pieces of candy. Five are bubble gum, 8 are chocolates, 5 are fruit chews, and the rest are peppermints. If he randomly draws one piece of candy what is the probability that it will be chocolate? A. 0.4 B. 0.45 C. 0.2 D. 0.8offering brainiest (GIVING 30 POINTS!!) Find the discriminant for the following equation: 3x^2 + 4x = 2 Question 3 options: 8 -8 40 -40 An image has coordinates: A (-2, 4), B (4, 6), C (3, -4). Given a scale factor of 3, what would be the new coordinates?Group of answer choicesA' (6, -12), B' (-12, 18), C' (9, -12)A' (1/2, 1), B' (3/2, 2), C' (3, 9/2)A' (-6, 12), B' (-12, -18), C' (9, -12)A' (-6, 12), B' (12, 18), C' (9, -12) Yn+1 = Yn + hf(x,y) e-/Pdx Y(x) = Y(x) [ fe y(x) G(x, t)= y (t)y(x) y (x)yz(t) W(t) -SGC G(x, t)f(t)dt L{f(t = a)U(ta)} = e-as F(s) Yp = L{eat f(t)} = F(s a) L{f(t)U(t a)} = esL{f(t + a)} as L{t"f(t)} = (1) dm [F(s)] dsn L{8(t - to)} = e-sto Yn+1 = Yn + hf(x,y) e-/Pdx Y(x) = Y(x) [ fe y(x) G(x, t)= y (t)y(x) y (x)yz(t) W(t) -SGC G(x, t)f(t)dt L{f(t = a)U(ta)} = e-as F(s) Yp = L{eat f(t)} = F(s a) L{f(t)U(t a)} = esL{f(t + a)} as L{t"f(t)} = (1) dm [F(s)] dsn L{8(t - to)} = e-sto Solve the following separable equation: (e-2x+y +e-2x) dx - eydy = 0 e = 0 y Oversight and Governance. Use this section to explain how different markets are regulated, by which agencies, and how that might impact decisions on which market(s) to list in. You must address: A. U.S. Exchanges. Select a major U.S. exchange(s) that the company you are reviewing could have considered in making its IPO listing decision. If the company is listed on a specific U.S. exchange, use that market (Nasdaq). Be sure to answer: 1. What rules and regulations do companies wishing to list on the Nasdaq need to follow and how might that affect listing decisions? Your answer should focus on basic entry and operation standards, including requirements for non-U.S. companies to trade on U.S. exchanges, citing relevant sources. 2. How are U.S. market regulations enforced and by which agencies? How might the costs of compliance and consequences of non-compliance have affected the company's listing decision? Justify your response. B. International Exchanges. Select a major non-U.S. exchange(s) that the company you selected could have considered in making its IPO listing decision. If the company is listed on a specific non-U.S. exchange, use that market. Specifically: 1. How can you determine the rules, regulations, and oversight bodies for this non-U.S. market? In other words, where would you look to find this information and how would you know to look there? Support your response with concrete examples. 2. What rules and regulations do companies wishing to list on this non-U.S. exchange need to follow and how is compliance enforced? How might those factors have affected the company's decision? Your answer should focus on how basic market requirements and compliance mechanisms are (or are not) different than those for U.S. exchanges, citing relevant sources. C. Multiple Markets. Analyze whether the selected company should or should not have considered listing its initial public offering (IPO) in more than one market. Justify your response. For example, can a company legally list in more than one market? If so, under what conditions? What are the risks and returns for attracting individual and corporate investors? D. Interest. Analyze how interest rate policies and announcements affect returns and decisions about listing in the two markets you selected. Provide specific examples to illustrate your answer. For example, how are interest rates determined in U.S. versus non-U.S. markets? How do governments use interest rate decisions to try to influence the markets under different conditions? when conducting a termination interview, a manager should multiple choice hint through coworkers that the employee has been fired. rush the fired employee offsite as it becomes a security issue. allow time for debate during a termination session. fire people when they have just returned from a vacation. provide written explanations of severance benefits. What happens when something grows exponentially?a.It has reached carrying capacity.b.Its outputs (death and emigration) are greater than its input (birth and immigration).c.There's nothing that's stopping its growth.d.There's only a small amount of food available. Does anyone have the guided notes for the AP world history modern course on Edge*enuity?