you are an it technician for your company. one of the employees has a computer that continually reboots when it's powered on. he has asked you to fix it. you suspect that the power supply may be failing. which of the following is the best initial step to determine whether the power supply is causing the reboots?

Answers

Answer 1

It is important to address the issue promptly to prevent further damage and ensure the employee's computer is functioning properly.

As an IT technician for the company, the best initial step to determine whether the power supply is causing the continuous reboots is to perform a power supply diagnostic test. This test involves disconnecting all peripherals and components from the computer except for the power supply, motherboard, and CPU. Then, the power supply is connected to a power supply tester, and the voltages are checked to ensure they are within the acceptable range. If the voltages are not within the acceptable range, then the power supply is most likely failing and needs to be replaced.

Alternatively, if a power supply tester is not available, you can try swapping out the power supply with a known good one to see if the issue persists. This will help to confirm whether or not the power supply is the root cause of the problem.

It is important to note that power supply issues can cause various problems with a computer, including unexpected reboots, data loss, and hardware damage. Therefore, it is important to address the issue promptly to prevent further damage and ensure the employee's computer is functioning properly.

Learn more about power supply here:

https://brainly.com/question/13577192

#SPJ11


Related Questions

BREIFLY (4 sentences) describe why cybersecurity is a necessary career field

Answers

Answer:

Whenever there are rules or general etiquettes that must be followed, there is no doubt that there will be humans to break them. Like how Laws and law enforcement was made to deter humans from breaking rules in the physical world. Cyber security is a necessary career field in society that will help prevent people from breaking rules in the cyber space.

determine one possible reason to autogenerate a negative review

Answers

One possible reason to autogenerate a negative review is by:

To express dissatisfaction with a product or service: If someone has had a negative experience with a product or service, they may want to share their frustration with others through a negative review.

What are other ways to get negative review?

There are several potential reasons why someone might want to autogenerate a negative review:

To hurt the reputation of a business: Some people may try to harm the reputation of a business by posting fake negative reviews in order to drive customers away.

To gain attention or recognition: Some individuals may want to attract attention to themselves by posting controversial or inflammatory content, including negative reviews.

To vent frustration: Some people may use negative reviews as a way to vent their frustration or anger, even if their experience with the product or service was not necessarily negative.

Therefore, To spread misinformation or propaganda: In some cases, negative reviews may be generated as part of a campaign to spread misinformation or propaganda about a particular product, service, or company.

Learn more about review from

https://brainly.com/question/27991472

#SPJ1

Tara needs to select all of the text in a Word document. Which keyboard shortcut will achieve this goal? Ctrl A Ctrl E Ctrl Esc Ctrl R.

Answers

It's CTRL + A ......................... "i'm just putting these full stops, because i can't answer with at least 20 characters. so" (:

1. The following pseudocode tests how quickly a user can type a given sentence without making any mistakes.
The statement finishTime = time.clock() returns wall-clock seconds elapsed since the first call to this function and places the answer in finishTime.
import time
sentence = "The quick brown fox jumped over the lazy dog"
n = len(sentence)
print ("Sentence to type: ", sentence)
errorFlag = False
print ("Press Enter when you’re ready to start typing! Press Enter when finished ")
ready = input()
print(“Go”)
time.clock() # you can call the function without returning a value
mySentence = input()
finishTime = time.clock()
if mySentence <> sentence then
errorFlag = True
endif
finishTime = round(finishTime,1)
if errorFlag == True then
print ("You made one or more errors")
else
print ("Total time taken ",totalTime, "seconds")
endif

(a) What does the statement import time do? [1]




(b) What type of variable is each of the following? [4]
(i) errorFlag
(ii) n
(iii) totalTime
(iv) mySentence

(c) What does line 15 do? [1]




(d) Alter the program so that instead of storing the sentence “The quick brown fox jumped over the lazy dog”, the user can enter the sentence on which they will be timed. [3]

2. A customer entering security details when logging into a bank website is asked to enter three random characters from their password, which must be at least 8 characters long and contain no spaces.Assume that in this case the password is HC&dt2016.
The letters are then compared to those in the password held on file for that customer.
Kelly has a first attempt at writing pseudocode for the algorithm.
import random
customerPassword = "HC&dt2016" #(assume read from file)
numChars = len(customerPassword)
index1 = random.randint(0, numChars-1)
index2 = random.randint(0, numChars-1)
index3 = random.randint(0, numChars-1)

print ("Please enter characters ", index1+1, index2+1, index3+1,
"from your password.")
print ("Press enter after each character: ")
char1 = input()
char2 = input()
char3 = input()
if



print("Welcome")
else
print ("Password incorrect")

(a) What value is assigned to numChars at line 3? [1]
(b) Complete the if statement at line 12. [3]
(c) What possible values may be assigned to index1 at line 4? [1]
(d) Describe two weaknesses of this algorithm. [2]










2. Write pseudocode for one or more selection statements to decide whether a year is a Leap year. The rules are:
A year is generally a Leap Year if it is divisible by 4, except that if the year is divisible by 100, it is not a Leap year, unless it is also divisible by 400. Thus 1900 was not a Leap Year, but 2000 was a Leap year. [4]

Answers

The given statement is False as it is not the only one.

There are plenty more such as:

“Sphinx of black quartz, judge my vow””Jackdaws love my big sphinx of quartz”Pack my box with five dozen liquor jugs””The quick onyx goblin jumps over the lazy dwarf”

This assignment requires the simulation of two lines in a grocery store using queues. The program should generate random arrival times and service times for each customer and print out messages indicating which line the customer arrived in, as well as the corresponding arrival time and customer number.

When customers finish checking out, the program should print out which line they were in, along with the corresponding customer number and total time in the line. The simulation should run for n number of minutes, where n is inputted by the user.

Learn more about customer on:

https://brainly.com/question/13472502

#SPJ1

While reviewing a Web site about a medical condition your aunt was just diagnosed with, you decide to check on the writer of the site. You verify that the writer is a well-known doctor and is a frequent television expert on this medical condition. What characteristic of an effective Web site does this show?



reputable author


verified


unbiased


relevant

Answers

Answer:

This is a characteristic of a reputable author

Which among the following is a collaboration tool that allows users to stay updated on topics of interest?
A browser cookie
A browser cookie
Really Simple Syndication
Desktop sharing

Answers

The collaboration tool that allows users to stay updated on topics of interest is Really Simple Syndication.

What is Really Simple Syndication?

It should be note that Users and programs can obtain website changes in a standardized, computer-readable format through RSS, a type of web feed.

Real Simple Syndication, or RSS, is a web feed format for constantly updated content like blog posts, news headlines, the newest homes and cars, etc. in a uniform format.

Learn more about tool at;

https://brainly.com/question/25898149

#SPJ1

Can someone answer the first question for me please I will give brainliest

Can someone answer the first question for me please I will give brainliest

Answers

Answer:

wired because if its wireless the the CONNECTION could break up and people would make people mad and it will be a better result in the long run

For angular how can we set up th edatabse.

Answers

you can not communicate directly between Angular and MySQL. You'll need to build a back-end Web service that calls MySql using php or node. Angular can communicate with this back-end Web service via http.

In Sarah's online English class, she's required to work with her assigned partner via
the Internet. Sarah and her partner have to decide on a mutual time to work and
share ideas with each other in order to finish their graded project. Sarah and her
partner are working on what digital literacy skill?
Risky sharing
Critical thinking
Collaboration
Digital reputation

Answers

I think it’s callaboration!

The digital literacy skill Sarah was working on in the English class assignment is collaboration. Hence, option C is correct.

What is a digital literacy skill?

A digital literacy skill is given as the skill or the technique that helps individuals to learn or work through the digital platform.

The learning and the sharing of ideas made by Sarah and her partner to work over the digital platforms help her in working on her collaboration skill. Thus, option C is correct.

Learn more about digital skills, here:

https://brainly.com/question/14451917

#SPJ2

two stations running tcp/ip are engaged in transferring a file. this file is 100k long, the payload size is 100 bytes, and the negotiated congestion window size is 300 bytes. the sender receives an ack 1500 from the receiver. • which bytes will be sent next? • answer: bytes 1500 through 1599

Answers

The number of bytes that will be sent or transmitted next is; 1620 bytes

How to find the number of bytes?

We are given that:

The file size = 100 KB

The  payload size = 100 bytes

The negotiated window size = 300 bytes.

This tells us that the sliding window can only accommodate a maximum number of 300/100 = 3 payloads

The sender receives an ACK 1500 from the receiver.

Total byte of the file is :

1000 KB = 1024000 bytes

The TCP header requires 20 bytes and IPV4 header requires 20 bytes.

Total TCP/IP header is composed of 40 bytes.

Sender receives an ACK 1500 from the receiver and as such the overhead which represents the bytes that will be sent next is;

1500 + (3 * 40)

= 1500 +  120

= 1620 bytes

Read more about Number of Bytes at; https://brainly.com/question/13484450

#SPJ1

I am looking to build a pc but im on a budget of $3,000 can i have a pc part list?

Answers

Answer:

I recommend going to https://pcpartpicker.com/list/

I takes you step by step into choosing the best parts for your pc, along with comparable prices.

Please please please help I beg I'll give brainiest. :(

A digital egg timer uses an input, process and output. (a) Suggest an appropriate input component. (b) Suggest an appropriate output component (c) Circle the most appropriate device below to be used for the timing process. Monostable or Astable

Answers

Answer:

A) toggle switch B) Push to Make switch C) Monostable

Explanation:

toggle because it needs to go off when the timer ends and not when u press a button

Push to make because you turn the timer off manually

Monostable because it needs to go off once not repeatedly

when both the original file with no hidden message and the converted file with the hidden message are available, what analysis method is recommended by johnson and jajodia?

Answers

Johnson and Jajodia are two renowned researchers who have made significant contributions to the field of steganography. They have proposed various techniques for hiding messages in digital data, such as images, videos, and audio files. In this context, one crucial aspect is to determine whether a given file contains a hidden message or not.

When both the original file with no hidden message and the converted file with the hidden message are available, Johnson and Jajodia recommend using the difference analysis method. This method involves calculating the difference between the original and the converted file and examining the statistical properties of the resulting values. If the values show a deviation from the expected pattern, it is likely that a hidden message is present. The difference analysis method is generally more reliable than other techniques, such as visual inspection or checksum verification.

In conclusion, Johnson and Jajodia's recommendation for analyzing a file with a hidden message when both the original and the converted files are available is to use the difference analysis method. This method can help to detect the presence of a hidden message by comparing the statistical properties of the original and the converted file. It is a reliable technique that can be applied to various types of digital data.

To learn more about steganography, visit:

https://brainly.com/question/13089179

#SPJ11

What is one way sprite properties are the same as variables?

Answers

values that sometimes we want to just read, and sometimes that we want to write to.

Aisha has finished working on a word processing document that contains 15 pages

Answers

Aisha has completed a 15-page word-processing document, showcasing her proficiency in creating and managing lengthy documents with various elements.

Aisha's completion of a 15-page word-processing document signifies the successful culmination of her efforts. Throughout the document, Aisha meticulously incorporated various elements such as text, images, tables, and formatting styles to ensure its visual appeal and readability. By dedicating her time and attention to detail, Aisha ensured that each page maintained consistent formatting and adhered to the required guidelines. Her ability to handle a document of this length showcases her proficiency in word processing and organizational skills. Aisha's accomplishment demonstrates her competence in effectively managing and producing high-quality documents using word processing software.

learn more about word-processing here:

https://brainly.com/question/29762855

#SPJ11

Aisha has just finished working on a word processing document that contains 15 pages. She wants to know the total word count of the document. Write a program or algorithm to calculate the total word count in the document.

Consider a deep neural net applied to decide between the following four categories: cat, tiger, human face, lion The neural net uses a softmax unit at the output layer. Consider the case where the values fed into the output layer are:cat 0.5 tiger 0.8 human face -3 lion 0.6The softmax converts these values into a probability vector.1. Compute the probabiity vector.2. Which outcome is the most likely?3. Which outcome is the least likely?4. What is the result of cross-entropy cost function if the target output is lion?

Answers

This is how to compute the probability vector using the softmax function, identify the highest and least likely outcomes, and calculate the cross-entropy cost function with a target output.

1. To compute the probability vector, we first apply the softmax function to the input values:
cat: e^0.5 / (e^0.5 + e^0.8 + e^-3 + e^0.6) = 0.239
tiger: e^0.8 / (e^0.5 + e^0.8 + e^-3 + e^0.6) = 0.416
human face: e^-3 / (e^0.5 + e^0.8 + e^-3 + e^0.6) = 0.00021
lion: e^0.6 / (e^0.5 + e^0.8 + e^-3 + e^0.6) = 0.345
So the probability vector is [0.239, 0.416, 0.00021, 0.345].
2. The outcome with the highest probability is tiger, with a probability of 0.416.
3. The outcome with the least likely probability is human face, with a probability of 0.00021.
4. To calculate the cross-entropy cost function with a target output of lion, we first convert the target output to a one-hot vector:
cat: 0
tiger: 0
human face: 0
lion: 1
Then we use the formula for cross-entropy:
-(0*log(0.239) + 0*log(0.416) + 0*log(0.00021) + 1*log(0.345)) = 1.06
So the result of the cross-entropy cost function with a target output of lion is 1.06.

Learn more about probability here;

https://brainly.com/question/30034780

#SPJ11

range-based loops are not possible in which of the following languages?

Answers

In a CPU with a k-stage pipeline, each instruction is divided into k sequential stages, and multiple instructions can be in different stages of execution simultaneously. The minimum number of cycles needed to completely execute n instructions depends on the pipeline efficiency and potential hazards.

In an ideal scenario without any hazards or dependencies, each instruction can progress to the next stage in every cycle. Therefore, the minimum number of cycles required to execute n instructions is n/k.However, pipeline hazards such as data hazards, control hazards, and structural hazards can stall the pipeline and increase the number of cycles needed to complete the instructions. These hazards introduce dependencies and conflicts, forcing the processor to wait for certain conditions to be resolved.Therefore, in a real-world scenario with pipeline hazards, the minimum number of cycles required to execute n instructions on a k-stage pipeline would generally be greater than n/k, depending on the specific hazards encountered during execution.

To learn more about simultaneously  click on the link below:

brainly.com/question/29462802

#SPJ11

1. Do you agree that artificial intelligent Machine are beneficial to human daily live, upport your anwer

Answers

Making use of data science and artificial intelligence is crucial, and its potential growth trajectory is unbounded.

What advantages does artificial intelligence offer people?

Artificial intelligence (AI) is quickly advancing in many "human" jobs, including customer service, language acquisition, and disease diagnosis. This has given rise to valid worries that AI would eventually displace workers in the sector.

Will we benefit from artificial intelligence in our daily lives?

Today, AI permeates every part of our online personal and professional lives. A crucial aspect in business is and will continue to be global communication and networking. Making use of data science and artificial intelligence is crucial, and its potential growth trajectory is unbounded.

To know more about  artificial intelligent visit:-

https://brainly.com/question/23824028

#SPJ4

Can you guys please help me? ;-;

Can you guys please help me? ;-;

Answers

A foul in sports such as basketball is an illegal personal contact with an opponent

what does a technician need in order to make changes to software installed on the computer of a customer?

Answers

A technician needs the customer's permission before making any changes to a computer.

What kind of work does a level one technician at a call center typically do?

A level one technician's main duty is to obtain information from the customer. All of the data must be accurately entered into the work order by the level one technician.

Which of the following software launches first when you turn on your laptop?

computing device. When a computer is turned on, an operating system, a specific program, must be started. By handling the intricate logistics of hardware management, the operating system's job is to make other computer applications more functional.

To know more about technician visit:-

https://brainly.com/question/14290207

#SPJ1

JavaFX FXML NetBeans 8.2
Please include screenshot of both the code and the output.
(50 pts) yourlastname_lab8a.java: Please create a program that includes the following components and capabilities:
A color display field (can be a text string or a geometric figure, but needs to be an element to which color is applicable).
Four scroll bars or sliders (your choice): Red, Green, Blue, Opacity.
User should be able to manipulate the look of the display field via these GUI elements.
Numeric values corresponding to current slider/scroll bar state should be displayed next to each bar and should update dynamically as the user manipulates the corresponding GUI element.

Answers

This program creates a GUI window with a color display field, four sliders for red, green, blue, and opacity, and labels to display the current values of the sliders.

How to explain the information

The program will be

# Create labels to display numeric values

red_label = tk.Label(window, text=f"Red: {red_slider.get()}")

red_label.pack()

green_label = tk.Label(window, text=f"Green: {green_slider.get()}")

green_label.pack()

blue_label = tk.Label(window, text=f"Blue: {blue_slider.get()}")

blue_label.pack()

opacity_label = tk.Label(window, text=f"Opacity: {opacity_slider.get()}%")

opacity_label.pack()

This program creates a GUI window with a color display field, four sliders for red, green, blue, and opacity, and labels to display the current values of the sliders. The update_color function is called whenever any of the sliders are manipulated, and it updates the color and text of the display field based on the slider values.

Feel free to run the code and interact with the GUI to manipulate the color display. The color display field will change dynamically as you move the sliders, and the numeric values next to each slider will update accordingly.

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

Prompt
What is a column?

Answers

Answer:

A column is a vertical group of values within a table. It contains values from a single field in multiple rows. ...

A column is a vertical group of values within a table. It contains values from a single field in multiple rows.

Why prompt is used?

Since we can choose only one of the prompts, let's work with prompt A. We can answer it in the following manner edgar Allan Poe believed that a good short story must have a single, unifying effect. He did apply that concept to his own short stories. Let's briefly analyze "The Fall of the House of Usher."

In the story, every element contributes to the story's effect: the setting, the characters, the dialogue, the word choice and the mood, among others. From the beginning, the narrator describes an "oppressive" weather. He proceeds to let us know that his friend Usher looks sick and strange. The house where Usher lives is also quite eerie. And to top it all, Usher's sister, who was buried alive, has returned for revenge.

Poe believed a good short story should possess a single, unifying effect, and that everything in the story should contribute to that effect. He achieves that in his short stories, where every element (characters, setting, imagery, word choice, etc.) contributes to the feeling of tension, anxiety, even horror.

Therefore, A column is a vertical group of values within a table. It contains values from a single field in multiple rows.

Learn more about element on:

https://brainly.com/question/14347616

#SPJ2


INFORMATION TECHNOLOGY
Is it good or bad to have a competitive advantage when
you want to buy software?

Answers

It is generally beneficial to have a competitive advantage when you want to buy software.

Having a competitive advantage in the context of buying software means having a unique edge or advantage over competitors when making software purchasing decisions. This advantage can arise from factors such as better negotiation skills, stronger relationships with vendors, access to exclusive deals or discounts, or advanced knowledge of the software market.Having a competitive advantage can be beneficial for several reasons:Cost Savings: With a competitive advantage, you may be able to secure better pricing or favorable terms during software procurement. This can result in cost savings for your organization, allowing you to allocate resources more efficiently.

To know more about software click the link below:

brainly.com/question/32755361

#SPJ11

1. create one of the two analyses below with at least two
bullets per area that addresses technology (can include information
systems, software, etc.
SWOT and associated TOWS
PESTLE
2b. Below your an

Answers

Answer:

Explanation:

Strengths:

- Advanced information systems: The organization has robust and scalable information systems that streamline operations and enhance efficiency.

- Technologically skilled workforce: The company has a team of skilled professionals who possess expertise in cutting-edge technologies and software.

Weaknesses:

- Outdated software: Some legacy systems and software may hinder agility and pose security risks.

- Limited IT budget: The organization may have constraints in allocating sufficient resources for technology upgrades and innovation.

Opportunities:

- Emerging technologies: Adoption of emerging technologies like artificial intelligence, machine learning, and blockchain can enhance operational effectiveness and create new business opportunities.

- Digital transformation: Embracing digitalization and transforming traditional processes can lead to improved customer experiences, cost savings, and competitive advantages.

Threats:

- Cybersecurity risk: Increasing cyber threats pose risks to sensitive data, intellectual property, and customer trust.

- Rapid technological advancement: Keeping pace with rapidly evolving technologies requires continuous investment and upskilling to avoid falling behind competitors.

TOWS Analysis (based on SWOT):

- Strength-Opportunity: Leveraging the organization's advanced information systems and skilled workforce to capitalize on emerging technologies and digital transformation opportunities.

- Strength-Threat: Strengthening cybersecurity measures and investing in technology upgrades to mitigate the risks associated with outdated software and cyber threats.

- Weakness-Opportunity: Exploring cost-effective alternatives and innovative solutions to overcome budget limitations and seize technology-driven opportunities.

- Weakness-Threat: Addressing budget constraints and prioritizing investments to mitigate the risks of falling behind competitors and losing market share due to rapid technological advancements.

2. PESTLE analysis addressing technology:

Political:

- Government regulations: Compliance with regulatory frameworks and data protection laws may impact technology adoption and implementation.

- Government support for innovation: Favorable policies and incentives can encourage research and development, leading to technological advancements.

Economic:

- Budget constraints: Economic downturns or budget limitations may affect investment in technology infrastructure and upgrades.

- Cost savings opportunities: Technology advancements can create cost-saving opportunities through automation, streamlining processes, and optimizing resources.

Social:

- Changing consumer preferences: Technological innovations should align with evolving consumer needs and preferences to ensure market relevance.

- Digital divide: Socioeconomic disparities can impact access to technology and digital literacy, requiring efforts to bridge the digital divide.

Technological:

- Disruptive technologies: Adoption of emerging technologies like artificial intelligence, Internet of Things, and cloud computing can drive innovation and competitive advantages.

- Cybersecurity risks: Increasingly complex and sophisticated cyber threats require robust security measures to protect sensitive data and systems.

Legal:

- Data protection and privacy laws: Compliance with legal frameworks related to data privacy and protection is crucial for technology-driven organizations.

- Intellectual property rights: Ensuring intellectual property rights protection is essential for innovation and safeguarding proprietary technologies.

Environmental:

- Sustainable technology practices: Organizations need to consider environmental implications and adopt eco-friendly technology solutions.

- Energy efficiency: Embracing energy-efficient technologies and practices can reduce environmental impact and operational costs.

A comprehensive understanding of the PESTLE factors allows organizations to identify opportunities and threats in the external environment, enabling effective strategic planning and decision-making.

Learn more about SWOT, TOWS, and PESTLE analyses to gain insights into assessing technology-related factors and their impact on an organization's overall strategy.

https://brainly.in/question/30485278

#SPJ11

What is the keyboard shortcut to show formulas in a worksheet (as opposed to the value)? OCTRL+S OCTRL + Z CTRL- There is no shortcut for showing formulas

Answers

CTRL +  (tilde) is a keyboard shortcut to show formulas instead of values in Excel spreadsheets. It can be found in the upper-left corner of most keyboards, below the Escape key or just left of the 1 key.

The keyboard shortcut to show formulas in a worksheet (as opposed to the value) is `CTRL + ~` (tilde).When working with Excel spreadsheets, you might want to display the formulas instead of the values in your cells. This could be done by using the "Show Formulas" button. But, if you're doing this frequently, it's easier to use a keyboard shortcut. To do this, press `CTRL + ~` (tilde) and it will show all of the formulas in your spreadsheet instead of the values.

The tilde symbol, ~, can be found in the upper-left corner of most keyboards. It is usually located below the Escape key or just left of the 1 key. It's worth noting that pressing the `CTRL + ~` (tilde) keyboard shortcut again will switch back to displaying the values.

To know more about Excel spreadsheets Visit:

https://brainly.com/question/10541795

#SPJ11

Can someone help me on a 60 second ringtone :(

Can someone help me on a 60 second ringtone :(

Answers

Answer:

If you have an apple phone, its as easy as importing it into Garage Band, cutting it to size, and exporting it as a ringtone or even a text tone. My text tone is now Megalovania.

Why is the GDD useful for game artists?
a.
because it contains specific directions for exactly what the artist must
create and exactly how to go about creating it


B. because it allows artists to see the big picture into which their individual
pieces of artwork will fit, which usually results in more unified artistic content for the game

c. because it lists the different subtasks of a game development project for
artists, along with their estimated time and progression

D. because it provides artists with the underlying structure of a game level
or mission in terms of layout, presentation of obstacles and options for
movement


pls answer fast

Answers

Answer:

i think ur answer would be either D, or B

Explanation:

what is our main external body part?​

Answers

Answer: Skin

Explanation: It’s the largest organ in the body and one of the most complicated. Not only does the skin hold everything in, it also plays a crucial role in providing an airtight, watertight and flexible barrier between the outside world and the highly regulated systems within the body.

(I hope this helped)

what is a communication protocols

Answers

A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.

The protocol defines the rules, syntax, semantics and synchronization of communication and possible error recovery methods.

Internal control components are built on the foundation of the ------- tone established by top management in its control environment.

Answers

Internal control components are built on the foundation of the ethical tone established by top management in its control environment.

Computer ethics is the study of the rules, principles, and practices that guide the use of computing technology and the disciplines that are related to it without impairing or infringing upon the moral principles and convictions of any one person, group, or entity.

Computer ethics is a notion in ethics that discusses the ethical problems and restrictions that result from using computers, as well as ways to prevent or minimize them.

Here you can learn more about ethical in the link brainly.com/question/11992384

#SPJ4

Other Questions
2. Display the following set of test scores in a stem-and-leaf plot.{84, 85, 91, 52, 71, 73, 92, 98, 85, 88, 82, 71, 73, 100, 84} It's like everyone tells a story about themselves inside their own head. Always. All the time. That story makes you what you are. We build ourselves out of that story. -Patrick RothfussWHAT ARE YOUR THOUGHTS????? Read an excerpt from "Television and the Public Interest" and answer the question. The speech was delivered by Newton N. Minow, chairman of the Federal Communications Commission, to the nations television executives in 1961.[1] But when television is bad, nothing is worse. I invite each of you to sit down in front of your television set when your station goes on the air and stay there, for a day, without a book, without a magazine, without a newspaper, without a profit and loss sheet or a rating book to distract you. Keep your eyes glued to that set until the station signs off. I can assure you that what you will observe is a vast wasteland.[2] You will see a procession of game shows, formula comedies about totally unbelievable families, blood and thunder, mayhem, violence, sadism, murder, western bad men, western good men, private eyes, gangsters, more violence, and cartoons. And endlessly, commercialsmany screaming, cajoling, and offending. And most of all, boredom. True, you'll see a few things you will enjoy. But they will be very, very few. And if you think I exaggerate, I only ask you to try it.[3] Is there one person in this room who claims that broadcasting can't do better? Well a glance at next season's proposed programming can give us little heart. Of 73 and 1/2 hours of prime evening time, the networks have tentatively scheduled 59 hours of categories of action-adventure, situation comedy, variety, quiz, and movies. Is there one network president in this room who claims he can't do better?[4] The best estimates indicate that during the hours of 5 to 6 P.M. sixty percent of your audience is composed of children under twelve. And most young children today, believe it or not, spend as much time watching television as they do in the schoolroom. I repeatlet that sink in, ladies and gentlemenmost young children today spend as much time watching television as they do in the schoolroom. It used to be said that there were three great influences on a child: home, school, and church. Today, there is a fourth great influence, and you ladies and gentlemen in this room control it.[5] If parents, teachers, and ministers conducted their responsibilities by following the ratings, children would have a steady diet of ice cream, school holidays, and no Sunday school. What about your responsibilities? Is there no room on television to teach, to inform, to uplift, to stretch, to enlarge the capacities of our children? Is there no room for programs deepening their understanding of children in other lands? There are some fine children's shows, but they are drowned out in the massive doses of cartoons, violence, and more violence. Must these be your trademarks? Search your consciences and see if you cannot offer more to your young beneficiaries whose future you guide so many hours each and every day [6] You must provide a wider range of choices, more diversity, more alternatives. It is not enough to cater to the nation's whims; you must also serve the nation's needs. And I would add this: that if some of you persist in a relentless search for the highest rating and the lowest common denominator, you may very well lose your audience. Because the people are wise, wiser than some of the broadcastersand politiciansthink.What type of evidence does Minow use to develop the idea that what is on television lacks value? By including expert testimony from two professional television executives By listing examples of the things one would see in a day of watching television By providing facts about the different types of people who watch television daily By using statistics on the amount of time children watch television each dayPlease help me if i dont get a 100 i am screwed Technological change can increase the demand for loanable funds because itA) has little effect on production cost.B) lowers the interest rate.C) can increase the expected profit.D) decreases the need for additional equipment.E) increases people's expected future disposable income. "Let E be the region that lies inside the cylinder x2 + y2 = 4 and outside the cylinder (x - 1)2 + y2 = 1 and between the planes 1 and z = 2. Then, the volume of the solid E is equal to 211 + LS?""L?TRUE/FALSE A health care provider informs the nurse that the complete blood count of a child shows shift to the left and instructs the nurse to explain this to the parents of the child. What does the nurse tell them? 1. The half-life of polonium-210 is 138.4 days. How many milligrams of polonium-210remain after 415.2 days if you start with 2.0 mg of the isotope? FIND MEASUREMENT OF ANGLE P if people can be prevented from using a certain good, then that good is called group of answer choices rival in consumption. excludable. a common resource. a public good. a concave mirror has a focal length of 40 cm. an object is placed 30 cm from the mirror. which of the following best describes the image? select all that apply. a concave mirror has a focal length of 40 cm. an object is placed 30 cm from the mirror. which of the following best describes the image? select all that apply. the image is real. magnification of magnitude greater than 1. the image is inverted. the image is virtual. magnification of magnitude less than 1. the image is upright. Pamela has a rectangular rug with an area of 90 square feet. The rug is 9 feet longerthan it is wide. Find the width of the rug.w = 15 feetw = 6 feetw = 10 feetw = 9 feetHELP PLEASEEE Which of the following facts should the writer include in her passage?A. Luther Baker was a local artist.B. Zeus at Olympia is one of the greatest Classical statues.C. Soil condition is important.D. George Washington Carver found many uses for the peanut.The passage: (1) The Boll Weevil Monument is located in Enterprise, Alabama. (2) This monument is considered the only monument that honors an agricultural pest. (3) Sometime between 1910 and 1919, the boll weevils made their way to Alabama and destroyed about 60% of the towns cotton fields. (4) After getting advice from local scientists, many farmers decided to grow other crops, mainly peanuts. (5) Varying crops kept the farmers and the town from financial ruin. (6) In fact, the town prospered greatly, and the change in crops improved the soil. (7) A local businessman named Bon Fleming thought the boll weevil deserved a monument for promoting change in the area. (8) In 1919, the monument was placed in the center of town to give thanks to the boll weevil for being a herald to prosperity, which is how the historical marker refers to the insect. (9) The monument that was originally there, however, didnt have a boll weevil on it. (10) The monument consisted of a Classical Greek woman holding a small fountain over her head. (11) In 1949, a man named Luther Baker thought a boll weevil should be a part of the monument. (12) He made one and put it on top of the fountain. Can cornstarch disintegrate in fire or an open flame? According to the systems viewpoint, the part of a system that involves turning raw materials and knowledge into a new and different product or service is called _____. multiple choice question. Which answer choice best describes whether the statement below is always correct, sometimescorrect, or never correct?A pair of vertical angles are also supplementary. A> The statement is sometimes correct; Vertical angles must be congruent so a pair of vertical angles issupplementary only when they each measure 90 degrees. B. The statement is sometimes correct: Vertical angles must be congruent so a pair of vertical angles issupplementary only when they are both obtuse angles. C. The statement is always correct; Vertical angles must be congruent by definition and since they form alinear pair, they will also be supplementary. D. The statement is never correct; Vertical angles must be congruent by definition and since they will eitherboth be acute angles or they will both be obtuse angles, their sum cannot equal 180 degrees exactly. Listing brokers A & B from Royalty Group list a home for $200,000. Total brokers remuneration is 5.5% and will share with the Homes 4U Group selling brokers C&D a retribution of 2.8% of the sales price. The listing broker A gets 40% of the listing remuneration and the selling broker C gets 70% of the selling broker's remuneration. Note: consider all amounts without taxes. How much will each broker (A, B, C & D) make? b. What is the total remuneration the Royalty Group will get? c. What is the total remuneration the Homes 4U Group will get? Calculate the compound interest a saleswoman would have to pay if she borrows$54 000 for 9 years at 12% per annum compound interest. What is swallowing stones chapter 6 about In the letter, Hamilton traced his emotions throughout the storm. Select all the quotes that express his emotions. How is an ethical situation different from an everyday problem?