A statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decisions making is defined as

Business ethics
Common good practice
Code of ethics
Common good approach

Answers

Answer 1

Answer: Code of ethics

Explanation: Code of ethics in professional field or organizational field is referred as the principles that are responsible for the correct conduct of business organization by governing its functioning and decisions.It is a major key of business field as it maintains right practices,handles issues, provides guidance etc.

Other options are incorrect because business ethics cannot be implemented as principle for the governing the organization working and employees. Common good practice and approach is the basic good conduct and approaching but these factors don't govern the business.


Related Questions

Sarah finds herself repeating the same keystrokes and mouse operations on a regular basis. What should she use to improve her efficiency?: *
a. Copy and Paste
b. Indices
c. Macros
d. Redo

Answers

Answer: c)Macro

Explanation: Macro function is the computing operation that is collection or group of commands and made into a single instruction.This instruction is created so that the repeated tasks can be  carried out automatically.This function helps in saving the processing time.

Other options are incorrect because copy and paste function copies the selected instruction or text and pastes it to the desired location, indices denotes the index having data collection and redo command is for undoing the function and restoring it.Thus, the correct option is option(c).

Convert A4B from hexadecimal to binary. Show your work.

Answers

Answer:

The answer is A4B₁₆ =  2635₁₀ =  101001001011₂

Explanation:

To convert from hexadecimal base system to binary base system, first you can do an intermediate conversion from hexadecimal to decimal using this formula:

where position of the x₁ is the rightmost digit of the number and the equivalents hexadecimal numbers to decimal:

A = 10.B = 11.C = 12.D = 13.E = 14.F = 15.

A4B₁₆ = A*16²+4*16¹+B*16⁰ = 2560 + 64 + 11 = 2635₁₀

Now, you have the number transformed from hexadecimal to decimal. To convert the decimal number 2635 to binary: Divide the number repeatedly by 2, keeping track of each remainder, until we get a quotient that is equal to 0:

2635 ÷ 2 = 1317 + 1;

1317 ÷ 2 = 658 + 1;

658 ÷ 2 = 329 + 0;

329 ÷ 2 = 164 + 1;

164 ÷ 2 = 82 + 0;

82 ÷ 2 = 41 + 0;

41 ÷ 2 = 20 + 1;

20 ÷ 2 = 10 + 0;

10 ÷ 2 = 5 + 0;

5 ÷ 2 = 2 + 1;

2 ÷ 2 = 1 + 0;

1 ÷ 2 = 0 + 1;

Now, construct the integer part base 2 representation, by taking the remainders starting from the bottom of the list:

2635₁₀ =  101001001011₂

What is the software that provides the mechanisms to access a database called?

Answers

Answer:

Database Management Software.

Explanation:

The software that provides  the mechanism to access the database is called  Database Management Software.There are two types databases  SQL  and  No SQL.There are various types of  database Management Software  present online for ex:-My SQL,Microsoft SQL server,Microsoft Access,Postgres SQL,Mongo DB etc.

A car holds 16 gallons of gasoline and can travel 312 miles before refueling. Write aC++ program that calculates the number of miles per gallon the car gets. Display the result on the screen.

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables Declaration and initialization

   int no_gallon=16;

   int dis=312;

   // find the miles per gallon

   double mile_gallon=dis/double(no_gallon);

   // print the results

   cout<<"number of gallons: "<<no_gallon<<endl;

   cout<<"distance travel before refueling: "<<dis<<endl;

   cout<<"miles per gallon is: "<<mile_gallon<<endl;

return 0;

}

Explanation:

Declare and initialize the number of gallon and distance travel without refueling. Calculate the miles per gallon by dividing distance with number of gallons.Then print the results.

Output:

number of gallons: 16

distance travel before refueling: 312

miles per gallon is: 19.5

Final answer:

The C++ program calculates miles per gallon by dividing the total distance traveled by the number of gallons of gasoline, then displays the result.

Explanation:

The question involves writing a C++ program that calculates the fuel economy of a car, specifically the number of miles per gallon (MPG) the car gets. Below is a sample C++ program that performs this calculation:

#include <iostream>

int main() {
   // Declare the variables for gallons of gasoline and total miles
   double gallons = 16.0;
   double miles = 312.0;
   // Calculate miles per gallon
   double mpg = miles / gallons;
   // Display the result
   std::cout << "The car gets " << mpg << " miles per gallon." << std::endl;
   return 0;
}
This program defines two variables for the number of gallons of gasoline and the total miles traveled before refueling. It then calculates the MPG by dividing the total miles by the number of gallons and outputs the result to the screen.

. The _____________ is the responsibility of the CISO, and is designed to reduce incidence of accidental security breaches by organization members.

Answers

Answer: SETA program

Explanation:

 The SETA program is basically stand for the security, education, training and awareness. It is basically used to reduce the accidental security which is break by the organization member such as employees, vendors and contractors.

The SETA program provided various benefits to the organization as it improve the behavior of the employees.It basically enhance the training and education program by focus and concentrate on the information security.

It can also inform he member of the organization about the report of violating many policies.

Briefly tell me what a PUT request does

Answers

Answer:

 The PUT request is the method by which it basically stored the entity that is provided the URI request to the server. The PUT request method basically demands that the encased substance be put away under the provided Request-URI.

As a rule the HTTP PUT strategy replaces the asset at the present URL with the asset contained inside the solicitation. PUT is utilized to both make and update the condition of an asset on the server.

The HTTP PUT strategy makes another asset or replaces a portrayal of the objective asset with the other request payload.

Which of the four digital-to-analog conversion techniques is the most susceptible to noise? EXPLAIN WHY.
a. ASK
b. FSK
c. PSK
d. QAM

Answers

Answer:

a. ASK.

Explanation:

ASK(Amplitude Shift Keying) :- It is the form of amplitude modulation.It represents digital data variations in the carrier wave's amplitude.

It is most susceptible technique  to noise because among the frequency or phase and amplitude ,amplitude is most affected by the noise as compared to frequency.

Create a single line comment before you define your variables that says ""Variable Definitions"".

Answers

Answer:

// Variable Definitions

int a=67;

float b=78.8797;

Explanation:

For creating a single line comment we use // slash. It is used for making the comment in the program. In this we made a comment with help of  // after that we create a two variable i.e a and b of integer and float type.

When a block exists within another block, the blocks are a) structured b) nested c) sheltered d) illegal

Answers

In programming, when a block exists within another block, it is described as nested. Nesting is a common and logical structure used to organize code.

When a block exists within another block, the blocks are b) nested. In the context of computer science, especially in programming, nesting refers to having one set of instructions inside another set.

This is a common structure in many programming languages where, for example, you can have a conditional statement inside a loop, or one function defined within another. Nesting helps in organizing code logically and can make the code easier to read and maintain.

An external entity may be: (1 point) (Points : 1.5) a person.
another department.
another computer system.
All of the above.

Answers

Answer: All of the above

Explanation:  External entity is the thing that belongs to the outside surface or environment.In relation with the organizational field , external entity is the any outside source that is not a part of the organization.A person can be external entity if he/she is not a part of organization or employee.

Another department can be external entity with respect to a particular department of the same organization ,E.g.- Finance department can be external entity for the human resource department and vice-versa.

Computer system belonging to a person can be external entity for the other employee even being in same or different department of the organization E.g.- Employee 1 has computer system and it is a external source for the employee 2 because it does not belong to him and is outside of the his surrounding .

Thus, all the options are correct.

______The component of a computer that contains the ALU (Arithmetic Logic Unit) is the RAM. (T/F)

Answers

Answer: False

Explanation:

 The given statement is false as, the component of the computer basically contain the arithmetic logic unit (ALU) in the central processing unit (CPU). The CPU operations are basically performed by the one and more than one arithmetic logic unit.

It is basically load the data from the input register in the computer system. The CPU basically provide various instruction and operation to the ALU so that it can perform various types of operation in the data.

The ALU stored the result in the output register of the system.

Explain the benefits a recursive algorithm can provide. Use an example from a process in your organization or with which you are familiar.

Answers

Explanation:

Recursion is when the function calls itself inside it's definition.The advantages of recursion are as following:-

The problems solved by recursion have small code and elegant as compared to it's iterative solution which will be big and ugly to look at.Recursion is best suitable for data structures such as trees it's solution more understandable and easy while it's iterative solution is very big and also a bit difficult.

#include<iostream>  

using namespace std;  

 

int factorial( int n1)  

{  

   if (n1 == 0)  

   return 1;  

   return n1 * factorial(n1 - 1);  

}  

int main()  

{  

   int no ;

cin>>no;

cout<<factorial(no)<<endl;

   return 0;  

}

Recursive function to find the factorial of a number.

Create a class Book with two private int fields, numPages and currentPage. Supply a constructor that takes one parameter and sets numPages to that value and currentPage to 1. Provide accessor methods for both fields. Also provide a method nextPage that increments currentPage by 1, but only if currentPage is less than numPages.

Answers

Answer:

The code is in the explanation.

Explanation:

/*Creating the class*/

public class Book{

      /*Here we put the attributes of the class;

      In our case, they are the two private ints*/

      private int numPages;

      private int currentPage;

    /*Here is the constructor.

    The constructor always has the same name as the class

     In (), are the parameters.*/

     public Book(int numberOfPages){

                numPages = numberOfPages; /*sets numPages to the value

                                                                    of the parameter*/      

               currentPage = 1; /*sets currentPage to 1*/    

}

   /*An acessor method is a method with which we can get the value of a      variable*/

    /*Acessor method for numPages*/

   /*numPages is an int, so the acessor method returns an int*/

    public int getnumPages(){

            return numPages;

    }

    /*Acessor method for currentPage*/

    public int getcurrentPage(){

           return currentPage;    

     }

     /*Method next page*/

     /*This method does not return anything, so it is a void method*/

     public void nextPage(){

     /*Verify that currentPage is less than numPages*/

     if (currentPage < numPages){

             currentPage = currentPage + 1;

     }

     }

}

The Java class Book contains private fields numPages and currentPage. Its constructor sets numPages to a given value and currentPage to 1. Accessor methods retrieve these values. The nextPage() method increments currentPage by 1 if it's less than numPages.

Here's the implementation of the Book class in Java:

```java

public class Book {

   private int numPages;

   private int currentPage;

   public Book(int numPages) {

       this.numPages = numPages;

       this.currentPage = 1;

   }

   public int getNumPages() {

       return numPages;

   }

   public int getCurrentPage() {

       return currentPage;

   }

   public void nextPage() {

       if (currentPage < numPages) {

           currentPage++;

       }

   }

}

```

This Book class has two private fields: `numPages` and `currentPage`. The constructor initializes `numPages` with the given value and sets `currentPage` to 1. Accessor methods `getNumPages()` and `getCurrentPage()` return the values of the respective fields. The `nextPage()` method increments `currentPage` by 1 if it's less than `numPages`.

correct answers plz
[tex] \sqrt{x-8} = 3[/tex]

Answers

Answer:

x = 17

Explanation:

[tex]\sqrt{x-8} = 3\\\\\sqrt{x-8}^{2}  = 3^{2} \\\\\\x - 8 + 8 = 9 + 8\\ \\x = 17[/tex]

Hey!

-----------------------------------------------

Steps To Solve:

~Square both sides

√x - 8² = 3²

~Simplify

x - 8 = 9

~Add 8 to both sides

x - 8 + 8 = 9 + 8

~Simplify

x = 17

-----------------------------------------------

Answer:

[tex]\large\boxed{x~=~17}[/tex]

-----------------------------------------------

Hope This Helped! Good Luck!

Which of the following keywords is used to remove a database table in Oracle? (Points : 2) DROP TABLE
ALTER TABLE...DROP
DELETE TABLE
TRUNCATE TABLE

Answers

Answer:

DROP TABLE

Explanation:

DROP TABLE is used to remove a database table in Oracle.

The syntax is DROP TABLE <TableName>;

For example: Suppose there is a table called Student in the database which needs to be removed. Then the administrator with the required privilege can issue with the following command:

DROP TABLE Student;

This is distinct from DELETE statement which is used to delete individual row or set of rows.

Write a method with the signature "boolean[] createAlternating(int length)" that takes an integer representing the size of an array, and then returns a new boolean array of that size where each index alternates between true and false (e.g., index 0 is true, index 1 is false, index 2 is true, and so on).

Answers

Answer:

// program in java.

import java.util.*;

// class definition

class Main

{

// mthod that fill the array with true and false

 public static  boolean [] createAlternating(int length)

{

// create array

   boolean arr[]=new boolean[length];

// fill the array

   for(int a=0;a<length;a++)

   {

       if(a%2==0)

       arr[a]=true;

       else

       arr[a]=false;

   }

// return array

   return arr;

}

// main method

public static void main (String[] args) throws java.lang.Exception

{

   try{

// scanner object to read input

Scanner scr=new Scanner(System.in);

System.out.print("Enter the size: ");

// read the size

int n=scr.nextInt();

// store the array

 boolean  []copy = createAlternating(n);

// print the array elements

 for(int i=0;i<n;i++)

 System.out.print(copy[i]+" ");

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read the size of array from user with Scanner object.call the method createAlternating() with parameter length.Then create an array of size length.Fill the array true at even index and false at odd index.return the array and print the elements.

Output:

Enter the size: 10

true false true false true false true false true false

Use truth tables to show that the following pairs of expressions are logically equivalent.

(a) p ↔ q and (p → q) ∧ (q → p)

(b) ¬(p ↔ q) and ¬p ↔ q

(c) ¬p → q and p ∨ q

Answers

Answer:

I attached you a picture with the answers

Explanation:

A truth table is a tabular representation of all the combinations of values for inputs and their corresponding outputs. It is a mathematical table that shows all possible outcomes that would occur from all possible scenarios that are considered factual, hence the name. Truth tables are usually used for logic problems as in Boolean algebra and electronic circuits.

Dеclarе and allocatе mеmory (on thе hеap) for a onе-dimеnsional array of 256 doublеs namеd pricеs

Answers

Answer:

double *prices=new double [256];

Explanation:

To allocate memory on heap we use new keyword.In the above statement an array name prices is declared and the memory allocated to it is on the heap memory.

First look at double * prices.It is a pointer this pointer is created on the stack memory which holds starting address of the array present on the heap memory of size 256..

What are the arguments for writing efficient programs even though hardware is relatively inexpensive?

Answers

Answer: Even though the hardware is inexpensive the writing of program is not efficient through this method as proper development of program is necessary for the clear execution due to factors like:-

The facility of writing program even the cost of hardware is less but it is not a free facility.It also has a slower processing for the execution of the programThe construction of the efficient program is necessary for the compilation and execution of it rather than poorly constructed program is worthless and inefficient in working.

A method is a set of instructions that manipulate the data within an object (Points : 2) True
False

Answers

Answer: True

Explanation:

 A method is the collection and set of the instruction that basically used to manipulate the data within the object. It basically perform specific task and we can easily reuse the given code various times without retyping the program again.

When we use methods it save lots of time as we can easily reuse the given code. Object function is known as methods where we can manipulate the data according to the needs of the programmer, when the data are define in the particular object.

Who are the users of the encryption technology?

Answers

Answer: The users of encrypted technology can range from a consumer to a professional. As an individual, you might tend to login to a social media platform. These activities mostly use encryption in order to prevent your data and information from being exposed. More general uses might include safeguarding sensitive data and information, governments protecting social security and records.

) The order of messages on a sequence diagram goes from _____. (Points : 6)
right to left
bottom to top
left to right
top to bottom

Answers

Answer:

Top to bottom

Explanation:

A sequence diagram shows the sequence or the order in which the interaction between components takes place.

It places them in order of the occurrence of the events or interactions between the components or objects thus arranging these from top to bottom.

The sequence diagram shows the way an object in a system functions and the order it follows.

In UML behavioral modeling, a message is _____. (Points : 6) a named location in memory where information is deposited and retrieved
a data structure to hold information
a function or procedure call from one object to another object
a relationship between two objects

Answers

Answer: a function or procedure call from one object to another object

Explanation: UML(Unified Modeling language) behavioral modeling is the depiction of the relation of the elements in a dynamic manner and the dependency on time .Message in the UML behavioral modeling is a functional call taking place from one element to another.

The interaction is the model is seen through the flow of messages.Other options are incorrect because message is not information holding data structure, does not display the relation between object rather presents the flow and is not a memory location .

Analysts use _____ to show the objects that participate in a use case and the messages that pass between the objects over time for one particular use case. (Points : 6) structural models
sequence diagrams
communication diagrams
class diagrams

Answers

Answer:Sequence diagrams

Explanation: Sequence diagram is the diagram that displays about the connection of the objects in a sequential manner. The sequence depicted through the vertical lines in parallel form was about the object function and the horizontal line showed interaction between them for the exchange of the information.

Other options are incorrect because structural models have the infrastructure in particular format, communication diagrams depicts the exchange of information through communication and class diagram is the diagram that displays the system's class.Thus the correct option is sequence diagram.

mkdir() is the command in Java to create a new directory.
a) True b) False

Answers

Answer:

True.

Explanation:

mkdir() method in java is a part of the file class.The mkdir() command is used to create a new directory and it is denoted by the path name that is abstract.This function mkdir() returns true if the directory is created and false if the directory is not created by this function.

Hence the answer for this question is True.

Which database property type increases the efficiency of a search on the designated field in the physical database?

Validation rule
Validation text
Indexed
Expression

Answers

Answer: Indexed

Explanation: Indexed property in the database system is for indexing .In this process reduction of the record/disk numbers results in the increase in the optimized performance. The structure of the index is in column form.

This technique rapidly provides the data from the table containing database when every query arises or requirement is proposed. Therefore the efficiency of the database increases.

Other options are incorrect because validation rule and text are regarding the  verification of the data user and text respectively and expression is defined as the group of one or more value.Thus the correct option is indexed.

Convert (675.6)8 to hexadecimal. (use base 2 instead of base 10 as the intermediate base for conversion).

Answers

Answer:

1BD.C

Explanation:

Keep in mind that octal number has 3 binary fields where the right field is the number 1, the center field is the number 2 and the left field is the number 4. you need that your 3 fields sum the final octal digit.

For example :

(1)8 = (001)2(2)8 = (010)2(3)8 = (011)2

The hexadecimal number has 4 binary fields where the right field is the number 1, the center field is the number 2 , the next center field is the number 4 and the left field is the number 8. you need that your 4 fields sum the final hexadecimal digit.

For example:

(F)16 = (1111)2(1)16 = (0001)2(6)16 = (0110)2

Step 1: Split your octal number  in digits and convert to binary form

         6                             7                           5               .                  6

        110                          111                         101              .                110

Step 2: Join your binary number and split in groups of 4 elements from the point (Important note: If you miss some element to complete the groups at the left of the point complete with zero's at the left, else if you miss some element to complete the groups at the right of the point complete with zero's at the right)

binary complete:      110111101.110

binary in groups of 4:

                     1                1011                      1101            .                110

Complete the groups with zero's (Remember the important note):

               0001                1011                      1101            .              1100

Step 3: Calculate the hexadecimal number

                  1                      B                         D               .               C

     

Assume a 8x1 multiplexer’s data inputs have the following present values: i0=0, i1=0, i2=0, i3=0, i4=0, i5=1, i6=0, i7=0. What should be value of the select inputs s2, s1 and s0 for the value on the multiplexer’s output d to be 1?

s2=

s1=

s0

Answers

Answer: s2=1 s1=0 s0=1

Explanation:

Generally speaking, the multiplexer is a digital circuit , build with combinational logic, that acts like a switch, sending to the output the current value present at the input which order number (in decimal) is equal to the binary combination of the select inputs, expressed in decimal form.

If the multiplexer is 8x1, in order to be able to pass to the output any of the 8 inputs, the number of select inputs (n), must satisfy the following relationship:

M(number of inputs) = 2ⁿ

In this case, as the only input which present value  is "1" ,is the input i5, the value present at the input select must be the binary combination of s₀, s₁

and s₂, that yields the decimal 5, i.e.,  s₀ = 1  s₁ = 0  s₂ = 1.

Create a float variable named circumference.

Answers

Answer:

Float circumference; // Create a float variable

Explanation:

The float datatype is used for storing the decimal point values .The syntax  to declaring  any float variable is given below.

float variable-name;

float  circumference; // create a float variable

circumference=89.9007;; // store the value in circumference

Following are program in c++

#include <iostream> // header file

using namespace std; //namespace

int main() // main function

{

   float circumference; // creating variable float

   circumference=89.9007; // storing value

   cout<<circumference;  // display value circumference

   return 0;

}

Output:

89.9007

write a program that does the following: 1. Declare the string variables firstname and last name. 2. Prompt the user for first name and last name. 3. Read in the first name and last name entered by the user. 4. Print out Hello follow by users full name. These questions could be found from this book C++ without fear second edition by Brian overland

Answers

Answer:

// here is code in c++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variable declaration

 string firstname,lastname;

 // ask to enter first name

 cout<<"enter the first name:";

 // read firs tname

 cin>>firstname;

 // ask last name

 cout<<"enter the last name:";

 // read last name

 cin>>lastname;

 // print the output

 cout<<"hello "<<firstname<<" "<<lastname<<endl;

return 0;

}

Explanation:

Part 1, declare variables "firstname" and "lastname".Part 2, Ask user to enter first and last name.Part 3, read the value of first and last name and assign to variables "firstname" and "lastname" respectively.Part 4, Print "hello" followed by first name and last name.

Output:

enter the first name:robert

enter the last name:doweny

hello robert doweny

Other Questions
10(1 + 3b)=-20 solve Is it true that 1 2/5 - 3/4 = 1/4 + 2/5? Prove your answer. Hydrogen reacts with sodium to produce solid sodium hydride. A reaction mixture contains 6.75 g Na and 3.03 g Hydrogen. Which reactant is limiting? 2. What does it mean for a molecule to diffuse down a concentration gradient? 6. The effect of describing Don Lupe's death near the end of the story is to Use the information below to answer the following questions: Common Stock: $17,000 Service Revenue: $20,000 Notes Payable: $5,000 Salaries Expense: $10,000 Accounts Receivable: $7,000 Ending Retained Earnings: $26,000 Supplies: $2,000 Insurance Expense: $1,500 Prepaid Insurance: $3,000 Utilities Expense: $4,000 Office Equipment: $16,000 Accounts Payable: $4,000 Cash: $24,000. An income statement prepared for the year ended December 31 2013 would reflect Net Income of how much? A Balance Sheet prepared as of December 31, 2013 would reflect total Assets of how much? A Balance Sheet prepared as of December 31, 2013 would reflect total Liabilities of how much? A Balance Sheet prepared as of December 31, 2013 would reflect total Stockholders' Equity of how much? True or false? It is always OK to administer CPR or apply pressure to a wound in all situations with an injured person. Question 13 options: True False Which of the following is 28/31 closest to? 0 1/2 1 Solve $16x+9=9y-2x$ for $y$ . Some research shows that cultural values and goals shape the kinds of discipline that parents use with their children. One example is that Puerto Rican mothers wanted their children to recognize their obligations and connectedness to others; their goals for their children were more ____________ than the goals of European American mothersSelect one:a. sociocentricb. individualisticc. contextuald. authoritative Create a float variable named area. which of the following isn't a composite number? (a): 69 (b): 52 (c): 41 (d): 33 I need is fast plzzzzzzzzzzzzzzzzzzzzz What are the common promoter elements found in eukaryotic genes, and how are they different from enhancer elements? Decompose the rectangle along the diagonal and recompose the two pieces to make a different shape. How does the area of this new shape compare to the area of the original rectangle? Explain how you know A top-fuel dragster accelerates from rest to a velocity of 100 m/s in 8s. What is the acceleration The Electric Potential Difference Created by Point Charges 13. Two point charges, +3.40 pC and -6.10 uC, are separated by 1.20 m. What is the electric potential midway between them? The skin includes multiple functions which of the following is not one of the skins functions A) prevents bacteria and other items from entering the bodyB) regulates body temperature C) protects the body from the sun and water lossD) works with bones to transfer vital elements through body if it takes 3.5 hour for the Hogwart Express, moving at a speed of 120 mi/hr, to make it from platform 9 and 3/4 Hogwart, how far apart are they Rachels mother takes her to the pediatrician for her 1-year checkup. Rachel is very friendly towards everyone she meets in the waiting room; she didnt show any reaction when her mother left her in the room nor upon her mothers return. According to Ainsworth, these are indicators that Rachel isa.Securely attachedb.Ambivalently attachedc.Avoidantly attachedd.Unattached What is 12500 written in scientific notation?