Answer: Ethics
Explanation:
Ethics is the basic principle for the personal code. The code of the ethics is basically designed for outline the values in the organization with honesty and integrity.
The ethics is basically depend upon the principle of core value of the organization. The code of the ethics basically guide the core value in the organization and breaking the rule of ethics can also cause termination from the organization.
Morality, integrity and honesty are all the sub part of the ethics vale in the organization. Therefore, ethics is the correct option.
Answer:
// Application in java.
// package
import java.util.*;
// class definition
class Main
{
// method for calculating interest
public static float calculateInterest(float start_bal,float i_Rate)
{
// calculate return
float return_Amount=start_bal+(start_bal*(i_Rate/100));
// return
return return_Amount;
}
// main method of the class
public static void main (String[] args) throws java.lang.Exception
{
try{
// scanner Object to read the input
Scanner sc = new Scanner(System.in);
// variables
float start_bal;
float i_Rate=5;
// ask to enter start money
System.out.print("Enter start money:");
// read start money
start_bal=sc.nextFloat();
// call the function and print the return amount
System.out.println("5% interest earned on $" + start_bal + " after one year is $" + calculateInterest(start_bal,i_Rate));
}catch(Exception ex){
return;}
}
}
Explanation:
Declare and initialize interest rate with 5.Then read the start money from user.Then call the method calculateInterest() with parameter start_bal and i_Rate.It will calculate the return amount after 1 year.Print the returned amount in main method.
Output:
Enter start money:1500
5% interest earned on $1500.0 after one year is $1575.0
Virus
Keylogger
Timebomb
Answer: Worm
Explanation: Worm is the malicious software program which acts as the infection in the computer system. It has the ability to replicate itself and spread in the other systems .It is found in those parts that have automatic operation and non-noticeable.
The effect of the worm is slowing down the operations ,disturb the network etc.Other options are incorrect because virus is the malicious program that infects the host, key-loggers are used for monitoring of system and time bomb is the program for releasing the virus in computer network. Thus, the correct option is worm.
Microsoft's skills on your resume can help it get past applicant tracking systems and into human hands for review. Additionally, having more in-depth knowledge of Microsoft Office applications can boost your earning potential.
Your proficiency and expertise with the Microsoft Office family of software products are collectively referred to as Microsoft Office skills.
Although MS Office has many various programs, employers may frequently assess your proficiency with some of the most widely used ones, such as MS Excel, MS PowerPoint, and MS Word.
The most popular businessproductivity software globally is Microsoft Office.
Therefore, Microsoft's skills on your resume can help it get past applicant tracking systems and into human hands for review.
Learn more about Microsoft, here:
#SPJ2
Answer:
Listing proficiency in Microsoft helps push your resume through applicant tracking systems and into human hands for review. Advanced knowledge of Microsoft Office programs can also increase your earning potential.
B. -2
C. "Open"
D. +2
Answer:
D. +2
Explanation:
The given function is an IF function where the first argument is a logical test, the second argument is the result if the logical test is true and the third argument is the result if the logical test is false. Depending on whether the result of the logical test is true or false, the respective value will be returned.
IF(logical_test, value_if_true, value_if_false)
In this case, the logical test first compares the value of B3 and D5. As B3 is not greater than D5, the result is false and the value for false will be returned. The value for false result of the logical test is equated by D5-B3 which is equal to 2. Thus the result of the IF function is +2.
O Header
O Footer
O Foot Note
O End note
Answer:
End note, I think plz tell me if im wrong thank you
Answer:
The answer is below
Explanation:
1. Lack of password enforcement
2. Outdated third party applications: this includes outdated software such as Apache, PHP, MySQL, OpenSSL, and VNC
3. General lack of patch management for the OS
4. General lack of system hardening:
5. Lack of backups
Ways to hardened the Linux/Unix based computer system is do the following:
1. Perform minimal Installation: this involves, installing softwares that are necessary, and limiting the number of admin users on the computer system.
2. Carry out Code Auditing: this is a means of preventing security issues, by withing more secure softwares to prevent variable declarations, or otherwise unexpected logic.
3. Ensure there is a Traffic filter firewall: this will helps to attacks from external users or hackers. Install, Web Applicatio firewall, which helps to filter out traffic.
4. Carry out Softwares updates: a software update can help prevent or guide against security leaks in a software
5. Install security updates only: this is done by filtering out the security-related programs and only upgrade packages which are referred to in the custom file.