Intro to Computer Science:
A zero-tolerance policy means that if the employee violates the policy, they will be _____.
promoted
fired
warned
reprimanded

The correct answer is: fired :)

Answers

Answer 1
When a employee violate a zero-tolerance policy they’ll be fired!
Answer 2

A zero-tolerance policy means that if the employee violates the policy, they will be fired. Thus, the correct answer is option B.

What is a Zero-tolerance policy?

A zero tolerance policy is one that penalizes every violation of a stated rule. People in positions of authority are prohibited by zero tolerance policies from exercising discretion or changing punishments to fit the circumstances subjectively. They must impose a predetermined punishment regardless of individual guilt, extenuating circumstances, or history.

Zero tolerance policies are studied in criminology and are used in both formal and informal policing systems worldwide. If an employee violates the policy, there will be no tolerance and they will be fired.

Therefore, a zero-tolerance policy means that if the employee violates the policy, they will be fired.

To learn more about zero-tolerance policy, click here:

https://brainly.com/question/27293242

#SPJ2


Related Questions

Explain why database management systems are used in hospitals? Discuss

Answers

The reason why database management systems are used in hospitals is because the use of Healthcare databases aids in terms of diagnosis and treatment, handle documentation and billing, and others.

What is a database management system in healthcare?

A database management system (DBMS) is known to be a type of software that has been developed to help people to form and keep databases.

It is one that helps to lower the risk of errors associated with medical operations and management. It reduces  paperwork and staff and also improves  performance.

Learn more about database management from

https://brainly.com/question/24027204

Steps of booting a computer

Answers

Steps of Booting
The Startup. It is the first step that involves switching the power ON. ...
BIOS: Power On Self Test. It is an initial test performed by the BIOS. ...
Loading of OS. In this step, the operating system is loaded into the main memory. ...
System Configuration. ...
Loading System Utilities. ...
User Authentication.

The following code appears in a sort function. Will this function sort in increasing order (smallest first) or decreasing order (largest first)? Explain your answer if (list[index] < list[index + 1]) { temp = list [index]; list[ index] = list [index +1]; list[index +1] = temp; }

Answers

A sort function sorts in an ascending or desceding order

The true statement is that the function would sort in decreasing order.

What is a sort function?

A sort function is a code segment that is used to reorder a list in ascending or descending order, when called or evoked

The order of the sort function

The code segment is given as:

if (list[index] < list[index + 1]) {

temp = list [index];

list[ index] = list [index +1];

list[index +1] = temp;

}

In the above code, we can see that the code compares a list element with the next element on the list, and the larger value comes to the front

This means that the sort function sorts in decreasing order

Read more about code segments at:

https://brainly.com/question/16397886

Which of the following is a characteristic of TIFFs?

universal standard for image file formats

cross-platform

the one version of TIFF that exists

only available as a vector graphic
please help

Answers

Answer:

What are the characteristics of a TIFF file?

A TIFF file supports grayscale as well as RBG,CMYK, and LAB color space. The format allows a color depth of up to 16 bits per color channel and is therefore ideal for data exchange during a RAW conversion. The abbreviation TIFF, or more rarely TIF, stands for “Tagged Image File Format”.

Answer:

universal standard for image file formats

A victimless crime is committed when
|. Select 3 options.
someone downloads a pirated song or video
a copyrighted image is used without permission
a stranger accesses your internet banking
a person downloads and uses pirated software
a hacker sells a company's financial statements

Answers

Someone downloads a pirated song or video a copyrighted image is used without permission and a person downloads and uses pirated software.

A victimless crime is committed when a copyrighted image is used without permission 2. a stranger accesses your internet banking 3. a hacker sells a company’s financial statements.

Victimless crimes are illegal acts that break the laws, but there is no single victim of the crime. They are against social values and laws. A copyrighted image is used without permission

Examples are gambling, traffic violations, etc. Thus, Victimless crimes differ from other types of crime because it does not have an identifiable victim. This crime is against laws and social values and beliefs.

To know more about victimless crimes, visit:

brainly.com/question/17251009

#SPJ6

what is containment and why is it part of the planning process

Answers

Answer:

Isolating affected channels, processes, services, or computers; stopping the losses; and regaining control of the affected systems. It is part of the planning process to identify the best containment option for each scenario or system affected.

Explanation:

explain declaration and initialization of one and two dimensional arrays with example

Answers

The declaration and initialization of arrays involves creating and using the arrays

How to declare an array?

Assume the programming language is Java.

To declare and initialize an array, we make use of:

One dimensional array: Data-Type Array-name [] = {List of array values}Two dimensional array: Data-Type Array-name [] [] = {List of array values}

Assume the array name of the one dimensional array is num, and the data type is integer.

The following can be used to declare and initialize the array to have 5 elements

int num [] = {1,2,3,4,5}

Assume the array name of the two dimensional array is num, and the data type is integer.

The following can be used to declare and initialize the array to have 2 rows and 3 columns

int num [][] = {{1,2},{3,4},{5,6}}

Read more about arrays at:

https://brainly.com/question/22364342

positive and negative of adblock plus

Answers

Answer:

Pros and cons of ad blockers

Remove distracting ads, making pages easier to read.

Make web pages load faster.

Keep advertisers from tracking you across websites.

Reduce bandwidth (especially important with mobile devices)

Reduce battery usage (again, important for mobile devices)

p

9) Which date is assigned the serial number of 1?


A. January 1, 1700


B. January 1, 2000


C. January 1, 1900


D. January 1, 1800

Answers

Answer:

c) January 1, 1900

Explanation:

January 1, 1900 (1 - 1 - 1900) is assigned the serial number of 1. The serial number 1 represents January 1, 1900. Hence, option (c) is the correct answer.

How many bytes can be stored in a 4gb flash drive

Answers

Answer:

4,294,967,296; theoretically

Explanation:

There is 1024 bytes in a kb, 1024 kb in a mb, 1024 mb in a gb.

So we can use 1024³ as a multiplier to convert gb->byte.

1024³ * 4 = 4,294,967,296 bytes.

However, in practice hardrives always have less useable storage than the quoted amount.

a) Explain any two problems associated with the existing system used by the organization. (25 marks)​

Answers

Answer:

Lack of Strategy

Many of the most common MIS issues can be traced back to a lack of a solid strategy. Information systems leaders are well aware of the many tools available to gather data on their network. But putting that information to use is often a challenge.

At one time, technology departments served as a separate operation, providing tech support and keeping an organization’s server equipment running. Today, MIS leadership often sits alongside other business leaders, working together to ensure that the technology being used supports the overall mission of the company moving forward.

Meeting Organizational Needs

MIS plays an ever-increasing role in organizations, with professionals relying on technology for every aspect of operations. Sales and marketing rely heavily on customer relationship software to track client interactions, for instance, while accounting needs its own software for billing, invoicing and financial tracking.

With more than half of all companies now relying on big data analytics, MIS is playing an even more important role. Before making a decision, today’s management teams are likely to pull reports on existing activity to ensure they use facts rather than make educated guesses.

Explanation:

// This pseudocode segment is intended to compute and display
// the average grade of three tests for any number of students.
// The program executes until the user enters a negative value
// for the first test score.
start
Declarations
num test1
num test2
num test3
num average
housekeeping()
while test1 >= 0
mainLoop()
endwhile
endOfJob()
stop

housekeeping()
output "Enter score for test 1 or a negative number to quit"
return

mainLoop()
output "Enter score for test 2"
input test2
average = (test1 + test2 + test3) / 3
output "Average is ", average
output "Enter score for test 1 or a negative number to quit"
input tesst1
return

endOfJob()
output "End of program"
return

Answers

The pseudocode to calculate the average of the test scores until the user enters a negative input serves as a prototype of the actual program

The errors in the pseudocode

The errors in the pseudocode include:

Inclusion of unusable segmentsIncorrect variablesIncorrect loops

The correct pseudocode

The correct pseudocode where all errors are corrected and the unusable segments are removed is as follows:

start

Declarations

     num test1

     num test2

     num test3

     num average

output "Enter score for test 1 or a negative number to quit"

input test1

while test1 >= 0

     output "Enter score for test 2"

     input test2

     output "Enter score for test 3"

     input test3

     average = (test1 + test2 + test3) / 3

     output "Average is ", average

     output "Enter score for test 1 or a negative number to quit"

     input test1

endwhile

output "End of program"

stop

Read more about pseudocodes at:

https://brainly.com/question/11623795

20
Select the correct answer
Mike logged into a shopping website and entered his username and password, which protocol will the website use to verify his credentials?
A HTTP
B SMTP
C. СМР
D. POP3
E. LDAP

Answers

Answer:

LDAP

Explanation:

The Lightweight Directory Access Protocol (LDAP) is a vendor-neutral application protocol used to maintain distributed directory info in an organized, easy-to-query manner. That means it allows you to keep a directory of items and information about them. This allows websites to verify credentials when accessing websites.

Put the steps of the decision-making process in the correct order.
1. Step 1
Gather data.
2. Step 2
Analyze choices.
3. Step
Make the decision.
4. Step 4
Evaluate the decision.
5. Step 5
Determine the goals.

Answers

Answer:

step 5, step 1, step 2, step 3, step 4

Explanation:

I belive that would be the answer. I hope this helps.

Nhich of these is an optical medium of storage?

Answers

Answer:

Compact Disks, DVDs, Floppy Drives, Hard Disk Drives

If you determine that the hard drive is experiencing excessive use but the Windows Experience Index reports that memory is the system bottleneck, which component do you upgrade first: memory or the hard drive? Why?

Answers

The reason why is it is good to use an Upgrade memory is because low amounts of memory can lead to much use of the hard drive and based n the fact that it is not costly to upgrade memory than to upgrade the hard drive.

What is upgrading memory?

This is known to b an act done so as to improve the performance of a computer.

It is often known as a RAM or system memory upgrade. An upgrade implies that one is adding memory modules along with the ones that were there or replacing the old ones. It is less costly when compared to hard drive upgrade.

Learn more about Upgrade memory  from

https://brainly.com/question/13196228

What does the standard deviation of a set of data tell you?
O A. The smallest data value
B. Whether the data are spread out or not
O C. How many data points there are
O D. The maximum value of the data
SU

Answers

Answer: It tells us about how our set of data is spread out as compared to our mean or expected value.

Explanation: Note: Standard deviation is represented by Greek Letter sigma.For example: A teacher in a class of particular students takes a learning ability test from the students. Average or mean marks of students is 52 with +/- 10 marks. Then 1σ (Sigma = standard deviation) it means 1 standard deviation = 68% students will lie in between 52 + 10 =62 marks and 52-10 = 42 marks region.  2σ (2 standard deviation) means among the students 95% of them will lie between 52 + 20 =72 and  52-20= 32 marks region.3σ (3 standard deviation) means 99.7% of the students will lie in the region where 52 + 30 = 82 and 52 – 30 = 22 marks region.  So for 3σ (3 Standard Deviations), only 0.3% of the total students deviate +/-30 marks from the average. It means 0.15% students will have marks less than 22 and 0.15%  students will have marks greater than 82.  In the schematic attached, I have tried to make you understand through a diagram. Please refer to the schematic 1.  It tells us about the how our set of data is spread out as compared to our average or mean. And distance from mean can be calculated through number of standard deviations that the data is how much below or above the average.For example:For 1σ 68% students will come under the curve of “Average Learners”  and rest of 32% will come under the curve of “Poor Learners” and “Very Talented Learners”.For 2σ 95% of the students will come under the curve of “Average Learners”  and rest will come under the curve of “Poor Learners” and “Very Talented Learners”.For 3σ 99.7% of the students will come under the curve of “Average Learners” and rest of 0.3% will come under the curve of “Poor Learners” and “Very Talented Learners”.

6. Which of the following items is not a storage
medium?
A. Plotters
B. Zip disk
C. Hard disk
D. Memory stick

Answers

Answer:

Plotters

Explanation:

A 'plotter' is an external hardware device like a printer used with a computer to 'print vector graphics' - basically in english it no hold storage like that

In programming 2+6 is an example of what math

Answers

Answer:

[tex]beinggreat78~here~to~help.[/tex]

2 + 6 in programming is an example of math. It is the same as in the real world. Plus signs in coding are also a form of string concatenaction, the term used for combining two strings into one, or a variable into a string.


Why do crawlers not use POST requests?

Answers

Answer:

Generally they do not do POST requests. This is just the current state of affairs and is not dictated anywhere, I believe. Some search engines are experimenting with crawling forms, but these are still GET requests.Explanation:

8. Show that x = xy + xy'
a) Using truth tables
b) Using Boolean identities

Answers

Answer:

B

Explanation:

Cause Show that x =Xy plus xy' is common = is Using Boolean Identify? tY me

list the factors that influenced the advancement of AI in recent years​

Answers

Answer:

In any case, there are 5 factors which are driving the development of Artificial Intelligent and other technologies of Big Data, ML, etc.

Next-Generation Computing Architecture. ...

Open Data. ...

Growth in Deep Neural Networks. ...

Legal and Ethical Issues. ...

Historical Datasets.

What year was internet inverted

Answers

[tex]\large\blue{\mid{\underline{\overline{\tt { →\:January \:1, 1983}\mid}}}}[/tex]

ARPANET→Advanced Research Projects Agency Networkthe forerunner of the Internet.

[tex]\purple{\rule{15mm}{2.9pt}} \red{\rule18mm{2.5pt}} \orange{ \rule18mm{2.5pt}}[/tex]

[tex]\sf{\:мѕнαcкεя\: ♪...}[/tex]

nivel 1: operadores pedir 2 números al usuario y Sumarlos, restarlos, multiplicarlo y dividirlos ​

Answers

Answer:

¿Esta pregunta no tiene ningún sentido?

Explanation:

¿que estas pidiendo?

Ncomputing and thin client
what it is
why is done , how it works and how it's
done ​

Answers

The term NComputing  is known to be a form of desktop virtualization company that is said to creates hardware and software to form virtual desktops.

The term Thin clients is known to be virtual desktops. They help a lot of users at the same time to share a single operating system instance.

What is the aim of a thin client?

In Ncomputer networking, a thin client is known to be a kind of low-performance computer that is known to be optimized and used for setting up a remote connection.

It is often used with a server-based computing system. The server here is one that often does most of the work, such as launching software programs, etc.

Learn more about Ncomputing from

https://brainly.com/question/12629145

Fumiko is a network technician. She is configuring rules on one of her company's externally facing firewalls. Her network has a host address range of 192.168.42.140-190. She wants to allow all hosts access to a certain port except for hosts 188, 189, and 190. What rule or rules must she write

Answers

The rule that she must write is that  A single rule allowing hosts 140–187 is all that is necessary; the default-deny rule takes care of blocking the remaining nonincluded hosts.

What is a Firewall?

A firewall is known to be a form of a network security device that helps one to manage, monitors and filters any form of incoming and outgoing network traffic.

This is often done based on an firm's formerly set up security policies. A  firewall is known as the barrier that exist between a private internal network and the public Internet.

See options below

What rule or rules must she write?

a) A single rule allowing hosts 140–187 is all that is necessary; the default-deny rule takes care of blocking the remaining nonincluded hosts.

b) Multiple rules are necessary for this configuration; one or more rules must define Deny exceptions for 188, 189, and 190, followed by the Allow rule for the 140–190 range.

c) A Deny rule is needed for 188, 189, and 190, and then exception rules for the 140–187 range.

d) The default Deny all rule needs to be placed first in the list, and then an exception rule for the 140–187 range.

Learn more about firewalls from

https://brainly.com/question/13693641

Text based game project 1

Answers

Answer:

What is your question?

Explanation:

It is possible to publish a presentation online. True False

Answers

Answer:

It should be true

Explanation:

I don't see why it wouldn't

Which of the following are vector graphic file formats? Choose all that apply.

AI

PNG

RAW

SVG
Please help

Answers

There are different kinds of files. The option that is a vector graphic file formats is SVG.

What are vector files?

Vector files are known to be a type of images that are created by using mathematical formulas that stands as points on a grid.

The SVG  is known as Scalable Vector Graphics file and it is known to be a  vector image file format as it make use of geometric forms such as points, lines, etc.

Learn more about vector graphic file from

https://brainly.com/question/26960102

Answer:

AI and SVG

Explanation:

learned it from a comment i give all credit to them

i need the full code for 6.1.3 code hs circles and squares please answer please help

Answers

In this exercise we have to use the knowledge in computational language in python  to write a code with circles and squares.

how to draw geometric figures in python?

inputs = 100

radius

   draw_circle(radius);

   pendown()

   begin_fill()

   circle(radius)

   end_fill()

   penup()

left(90)

forward(radius*2)

right(90)  

penup()

setposition(0,-200)

color("gray")

bottom_radius = int(input("What should the radius of the bottom circle be?: "))

draw_circle(bottom_radius)

draw_circle(bottom_radius)

See more about python at brainly.com/question/18502436

Other Questions
Round of to the numbers as indicated:1. 48521To nearest 10:To nearest 100:To nearest 1000:1. 674502To nearest 10:To nearest 100:To nearest 1000:3. 3875To nearest 10:To nearest 100:To nearest 1000: The mean length of 10 childrens' index finger is 12.6cm. The mean length of 6 adults' index finger is 16.1cm. What is the mean length (rounded to 2 DP) of these 16 people's index finger? The doctrine that holds the view that historical circumstances are determined by a sequence of economic eventsconnected to the act of production is known as ............O A. Economic determinismO B. Historical materialism11 a 0O C. RationalizationO D. Economic materialism What is the name given to a polynomial with 10 terms A triangle is inside of a rectangle. The triangle has a height of h and a base of b. Section 1 is to the left of the triangle, and section 2 is to the right.Look at the drawing of a triangle within a rectangle. The triangle and the rectangle have the same base, b, and height, h.If the area of the triangle is 48 square units, what is the total area of sections 1 and 2? square units If Alex did 3/6 and then 1/4 of his homework, how much more does he need in order to finish ALL of his homework? 1.- Coloca las preposiciones que faltan. Cecilia trata _ __mucho cario ____ su gato En ese partido tuvieron que jugar ___sus propios compaeros t y yo lograremos convencerla. Baj las escaleras. ________ ayer el ascensor no funciona. 2.- Corrige las preposiciones mal utilizadas. Ese restaurante solo abre a la noche Luis est capacitado por ese trabajo En vacaciones iremos con autobs a Pars Tienes muchos libros a leer este trimestre? 3.- Construye oraciones con las siguientes estructuras: artculo - sustantivo - verbo - preposicin - determinante posesivo - sustantivo: pronombre - verbo - adverbio - preposicin - artculo - sustantivo: artculo - sustantivo - adjetivo - proposicin - artculo - sustantivo: verbo - determinante demostrativo - sustantivo - adjetivo adverbio Pythagorean Theorem (Rounding)Find the length of the third side. If necessary, round to the nearest tenth. SOMEONE PLEASE HELP ME ILL GIVE YOU BRAINLIST ANSWER AND POINTS!!!! IMAGE DOWN BELOW!! In a joint family couples are encouraged to produce more children.justify Edhesive Assignment 8: Personal Organizer. I keep getting a bad input message on my line 52. Any tips on how to fix this?I've included photos of my code. African Americans who fought for the union during the civil war A buoy starts at a height of 0 in relation to sea level and then goes up. its maximum displacement in either direction is 6 feet, and the time it takes to go from its highest point to its lowest point is 4 seconds. which of the following equations can be used to model h, the height in feet of the buoy in relation to sea level as a function of time, t, in seconds? h = 4 sine (startfraction pi over 6 endfraction t) h = 4 sine (startfraction pi over 3 endfraction t) h = 6 sine (startfraction pi over 4 endfraction t) h = 6 sine (startfraction pi over 2 endfraction t) A desktop is one kind of computer. Name two other kinds? Pls, help me! I promise to give B HELPPPPPP PLEASE! URGENT 40% if what number is 46? What have we gained by using technology to explore the ocean? It is made of brass and is around the size of a large pocket watch, with a normal clock dial showing roman numerals and a smaller dial at the bottom for the second hand. the clock is suspended inside a swivelling brass ring fitted to the inside of a wooden box this is the key to keeping the chronometer level even in an unsteady ship. a history of the world in 100 objects, neil macgregor write two to three sentences explaining how the image reinforces the text. Give any two importance of establishment of diplomatic mission in foreign country? Removal of all or part of the seminal vesicle is called.