how should you respond if a student or employee tells you that he/she brought a computer program from home ot use at school

Answers

Answer 1
tell them to use it on their break or when they are done doing their work. the computer program shouldn’t distract them from doing what they are supposed to do

Related Questions

Which tool uses images and other visual elements to provide artistic
inspiration to programmers who are designing a program?

Answers

Two of the tool that uses images as well as other visual elements are;

Adobe Illustrator and Adobe Photoshop.

What are tools for designing?

Designing tools are the software that is been use to provide artistic inspiration  and used for different purpose of design.

These tools are very interesting and they provide artistic inspiration to programmers who are designing a program.

Learn more about tools at:

https://brainly.com/question/11013757

Do you believe that technology has or is bringing out the worst in society? Why?

Answers

Answer:

No I think technologies are helpful for the humanity  in case the people are used it for valuable tasks .

Explanation:

Technologies have two sides effects and we can use the better side to facilitate our life .

5. Nadia wants to calculate the total interest, which is the total amount of the payments minus the loan amount. In cell F6, enter a formula that multiplies 12 by the Term and the Monthly_Payment, and then subtracts the Loan_Amount to determine the total interest

Answers

Answer:

vvvv

Explanation:

The excel function is to press  B4 - D6 * 2% * 0.5 " and press enter.

What is excel function?

A function in Excel is known to be a kind of formula that has been preset and it is one that can helps carry out mathematical, statistical and other  operations.

Note therefore that The excel function is to press  B4 - D6 * 2% * 0.5 " and press enter.

Learn more about excel from

https://brainly.com/question/18565547

#SPJ2

what is the difference between 2nd and 3rd generation of computers?​

Answers

Answer:

the third generation computer is based on the linked chip

Explanation:

Answer:

Explanation: The second-generation computer is based on the transistor whereas the third generation computer is based on the integrated chip. The second-generation computer is costly whereas the third-generation computer cost is less as compared to a second-generation computer.

how can a system of AI be implemented in the universities

Answers

Organizations in different industries are using artificial intelligence (AI), machine learning, and data science to uncover deep insights about their processes and procedures and make predictions that will help them allocate resources and increase productivity. Universities, like other businesses, need to do the same to best serve their students and protect their bottom line.

AI can help universities predict, for example:

The probability that a prospective student will apply for a particular program
The probability that the prospective student will pass the preliminary admission screening
The probability that an accepted student to actually enroll
How likely it is that a student will be at risk
Which jobs students should apply for
The likelihood that an alumnus / alumna will donate to the university
In a marketing use case, the university can build a model to predict whether a prospective student will apply. The prediction would be based on interaction data including the following:

How they arrived at the university website
Which pages they visited
Which buttons they clicked
How long they spent on the site
Whether they tried to apply but didn’t submit
What location they visited the university website from
For prospective students who have a high probability of applying, the university can do some follow-up to encourage them to submit their applications. This can increase the marketing conversion rate and make the university more cost-effective.

AI is also useful after the university receives applications. It can help identify which applications will pass a preliminary admissions screen. This allows the university to accept more applications while keeping the same number of people working on the admissions process. AI can help at the preliminary stage, allowing staff to focus on the following admissions stages.

After the university decides which prospective students to accept, not all accepted students will actually enroll. This challenge can directly affect the university revenue. Low enrollment rate means that the university needs to take more efforts to get more students in limited time. While a high enrollment rate can cause a capacity problem which is additional cost to the university for providing extra resources to assist more students. AI can help to predict which accepted students are going to enroll so that the university can have a better preparation for the next intake in terms of dorm space, classes needed, and other resources.

After the students enroll in the university program, the performance of these students will affect the university’s reputation, for better or for worse. The admissions process helps to identify promising students. However, everything can change over the course of a college career, including the students themselves. It is essential for the university to track their students’ progress so they can pinpoint those who are at risk of failing one or more courses and determine what kind of assistance they need to graduate. The increased graduation rate can help the university improve its reputation and increase its accreditation, which can attract more students. Florida International University is an example of a university that has already implemented AI to predict and help students at risk.

After graduation, the university can continue to help students with their employment by building models that recommend to them specific jobs based on job requirements, the student’s profile, behavior, and academic performance history. By helping students get jobs fast, students enter the workforce successfully, industries benefit, and universities fulfill their missions of helping students build on their academic careers.

The downstream effect is that many grateful alumni want to give back to the university. But sometimes they don’t know how. For their part, universities have so many alumni, and it’s difficult for the institution to keep in contact with all of them. AI can help universities predict which alumni to target for donation based on demographic data, records of recent interactions, and their relationship with the university.

These are just a few examples of how using AI and machine learning can help bring value to universities. There are other use cases as well, such as how to match students with lecturers or academic advisors, how to select students to receive scholarships, which elective courses to recommend to students, how to predict student retention and which students will fail. When it comes to using AI to optimize the university experience, the possibilities are virtually limitless.

A set of methods on the logic layer that is able to directly communicate with the data layer to retrieve information is known as a(n) __________.

Answers

We have that A set of methods on the logic layer that is able to directly communicate with the data layer to retrieve information is known as API(Application programming interface)

From the question we are told

A set of methods on the logic layer that is able to directly communicate with the data layer to retrieve information is known as a(n)

API(Application programming interface)

Generally API possess the ability or function to retrieve  information and communicate with the data layer

Therefore

A set of methods on the logic layer that is able to directly communicate with the data layer to retrieve information is known as API(Application programming interface)

For more information on programming  visit

https://brainly.com/question/13940523

Answer: A set of methods on the logic layer that is able to directly communicate with the data layer to retrieve information is known as a(n) API

How does beamforming improve network service?

• by using device locations to better target service signals

• my sharing service signals between devices on network

• my connecting device is directly to power sources

• are using multiple antennas to increase range in bandwidth

Answers

Beamforming can improve network service by using device locations to better target service signals.

This is because, beamforming helps to deliver higher signal quality to the target receiver.

What is beamforming?

beamforming can be regarded as application of different radiating elements that is transmitting the same signal.

This signal is usually identical in wavelength and phase, and  by reinforcing the waves in a specific direction the goal can be acheived.

Learn more about beamforming at:

https://brainly.com/question/12809344

What are the four components of security documentation?

Answers

Answer:

it is known as the IAAA

Explanation:

Identification, authentication, authorization, accounting.

Identification

Identification creates an account or ID that identifies the user, device, or process on the network. This process is used to verify a legitimate user. In some cases, this is where the billing and delivery addresses must match to prevent fraudulent payment methods.

Authentication

Authentication validates a user's identity by asking for specific information, such as a unique username and password or a fingerprint. This is the first major step in access control and must be met before the user goes any farther.

Authorization

Authorization allows users to perform certain actions like accessing, editing, and saving files. Authentication allows users into a system where they can access files and make changes. The authorization process determines where the user has the right to go within a network. Types of users might include administrators, power users, and standard users. Administrators, or "admins," run the show. They decide who can access resources on the network. Power users are typically employees who tend to have a lot of access to features and information. Standard users are usually business partners or vendors whose access is limited to files and information specifically shared with them.

Accounting

Accounting measures the overall access of users by tracking the amount of information they access, the resources they consume, and the number of hours they spend on a session. Everyone's actions are visible on a network. This holds users accountable for their actions. If something goes wrong or sensitive data is leaked, management and administration can track the issue to specific users and timeframes.

Brainleist please! :)

ITIL 4: Which of the following TRUE with respect to Practices in ITIL®?

A Practices are independents activities outside SVC
B: practice is just a new name given for process
C: practices support multiple activities within Value chain
D: every practice is tightly linked to a specific activity within value chain ​

Answers

Answer:

m

Explanation:

it would be c cause i take the test

The option that is true with respect to Practices in ITIL is that its practices support multiple activities within Value chain.

What are ITIL practices?

ITIL is known to be the background of all the  best methods used for delivering IT services.

Conclusively, the key element in the ITIL SVS is known to be the Service Value Chain as it uses an operating model for service delivery. Its practices aids the use of different activities within Value chain.

Learn more about Practices from

https://brainly.com/question/1147194

The lowest amount you can pay on your credit card each month

Answers

Answer: A credit card minimum payment is often $20 to $35 or 1% to 3% of the card balance, whichever is greater.

Explanation: The minimum payment on a credit card is the lowest amount of money the cardholder can pay each billing cycle to keep the account's status “current” rather than late.

How does the integration of system engineering early in the design process provide benefits to the overall design?

Answers

Answer:

Systems Engineering helps avoid omissions and invalid assumptions, helps to manage real world changing issues, and produce the most efficient, economic and robust solution.

mention 5 types of assembly language​

Answers

Answer:

types of assembly languages:

CISC: Complex Instruction-Set Computer

RISC: Reduced Instruction-Set Computer

DSP: Digital Signal Processor

VLIW: Very Long Instruction Word

Explanation:

The range of Cell that go across the spread sheet and are identified by numbers is called​

Answers

Cells are identified by the Cell Name (or Reference, which is found by combining the Column Letter with the Row Number. For example the cell in Column "C" in Row "3" would be cell C3. Cells may contain Labels, Numbers, Formulas or Functions. Cell Name: By default, the name of a cell is the cell reference.

Hope this helps

code is the code or instructions used to create a Web page or
program.

Answers

Answer:
HTML
Explanation:

Paul entered the following formula into a cell but it keeps popping up with an error. The formula he entered is: =IF(B9>500,IF(F9="Yes",B9*B20,B9*B21)"Empty"). Which of the following is the corrected version?

Answers

Excel formulas are expressions used to perform computation.

The corrected version of the formula is =IF(B9>500,IF(F9="Yes",B9*B20,B9*B21),"Empty")

How to determine the correct formula

The formula that returns an error is given as:

=IF(B9>500,IF(F9="Yes",B9*B20,B9*B21)"Empty")

The format of an IF function is:

=IF(condition, "value if true", "value if false")

In the given formula, we have:

Condition: B9 > 500

Value if true: IF(F9="Yes",B9*B20,B9*B21)

Value if false: Empty

The above means that, there is a missing comma between the values if true and false

Hence, the corrected version of the formula is =IF(B9>500,IF(F9="Yes",B9*B20,B9*B21),"Empty")

Read more about Excel formulas at:

https://brainly.com/question/14820723

Check your knowledge
14
Anna specialises in portrait
photography. She uses her website
to reach potential customers and
has recently set up an SEM
campaign to draw more traffic to her
site.
min
She wants to use negative keywords
to make sure her ads don't appear
for people who aren't potential
customers.
min
Which of the following keywords are
the negative keywords?

photographer
portrait
landscape
family photo
watercolour

Answers

Answer:

Landscape and Watercolour are the negative keywords.

Which of the following options can you set when you create or edit a data bar conditional formatting rule? Select all the options that apply.

1.) how to display negative values
2.) value used for the longest data bar
3.) font color of the text
4.) fill color of the data bars

Answers

When creating data bar using conditional formatting, you can fill color of the data bars and select the display of negative values.

Microsoft Excel

Conditional formatting is done to automatically apply formatting using colors, icons, and data bars to cells based on their value.

Conditional formatting makes it easy to select cells or ranges of cells.

When creating data bar using conditional formatting, you can fill color of the data bars and select the display of negative values.

Find out more on Microsoft Excel at: https://brainly.com/question/1538272

Why is it useful to understand coding fundamentals even if you work in a game design role that doesn’t traditionally write code?

Answers

Answer:

Learning to code not only prepares young minds for our increasingly tech-driven world, but also allows them to foster creativity, gain problem-solving skills, and improve their overall academic performance

Explanation:

Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning

Answers

AI-driven attacks caused sandbox technology to automate and introduce artificial intelligence learning. AI and machine learning can be used to fight against malware attacks.

Artificial intelligence, machine learning, and malware

Artificial intelligence (AI) refers to the ability of a PC to perform tasks done by humans due to the requirement of discernment.

Machine learning is a subdivision of (AI) based on the use of data and algorithms to mimic human learning.

Malware is malicious software generated by cybercriminals, which are capable of stealing unauthorized information.

Learn more about malware here:

https://brainly.com/question/399317

When a single controller device communicates with multiple peripheral devices, what wires are simultaneously connected to all devices in the network

Answers

The wires that are simultaneously connected to all devices in the network are;

SDA(Serial data line) and SCL

Integrated Circuits Communication

This involves I²C which is a form of communication based on integrated circuits.

Now, this I²C is a serial communication interface that has a bidirectional two-wire synchronous serial bus which usually comprises of two wires namely SDA (Serial data line) and SCL (Serial clock line).

Read more about integrated circuits communication at; https://brainly.com/question/26153031

What is the processing speed of the first generation computer ?

Answers

Answer:

Millisecond

Explanation:

We might know millisecond is very small and it is

not used now as computer speed

Want to play pay day 2

Answers

Answer:

answering once again

Explanation:

List and briefly define the four main elements of a computer.​

Answers

-Processor(CPU)
The processor is the important element of the computer. It controls all the operations that are performed by the computer.
-Main Memory(RAM):
The main memory is referred as the primary memory. It is volatile in nature.
It stores the data and programs temporarily. It is a temporary memory.
-I/O Modules:
The I/O modules moves the data between the computer and other peripheral devices of the system.
-System Bus:
The bus that connects the CPU to main memory on the mother board, I/O modules and other components within the system.

What does a b2c website use to track the items you select on the website

Answers

B2C website track the items you select on the website using cookies.

B2C

Business-to-consumer is the process of selling products and services directly to consumers, with no middle person. This is usually done using online retailers who sell products and services to consumers through the Internet.

HTTP cookies, or internet cookies are used by web browsers to track, personalize, and save user information.

Find out more on B2C at: https://brainly.com/question/25743891

Mark the statements that best describe the use of spreadsheets and tables in presentations.

They should not take up much space on your slide.
The font size should be at least 18-point.
Headers should be descriptive of the cell content.
Use at least six rows.
Do not include row headers in tables.
Limit the number of columns to four.

Answers

Answer:

The font size should be at least 18-point.

Headers should be descriptive of the cell content.

Explanation:

which of the following is typiacally the last step of the mail merge process

Answers

Decide list of recipients : is typically the last step of the mail merge process.
s

2. When you establish a connection to a remote host using Remote Desktop Connection, what appears at the top of the screen that lets the user know they are connected to a remote machine?

Answers

A connection bar appears to tell the user that they are connected via a Remote Desktop connection

A connection bar appears at the top of the screen that lets the user know they are connected to a remote machine.

What is a Remote machine?

A remote machine may be defined as a type of computer that a user has no access to physically but may be able to access remotely via a network link from another computer. Remote connections are made through the use of a network that connects the computer and the device that is used to access it.

A Connection Bar is displayed at the top of the screen. It identifies the computer you are remotely accessing (name in the center of bar); you can minimize. The host screen will be locked during an RDP connection, which is convenient if you don't want others to see what you are doing on the remote computer.

Therefore, a tool that appears at the top of the screen that lets the user know they are connected to a remote machine is known as a connection bar.

To learn more about Remote machines, refer to the link:

https://brainly.com/question/14719354

#SPJ2

Text messaging has grown in popularity as cell phones and other devices have proliferated. Which uses are appropriate business applications for text messaging

Answers

Answer:

To schedule a meeting or ask a question with/to your superiors is a great one. You can also use it to set up your schedule with your other coworkers.

The uses are appropriate business applications for text messaging

Texts can be used for marketing purposes to send sales messages.Texts can be used as a substitute for receiving important messages when a phone call is inappropriate.

What is the importance of Text messaging?

Texting is used to transmit brief personal, family, social, and professional communications. When you are carrier-verified, text messages are delivered quickly. You can program and automatically send texts.

When you use corporate messaging software, texting is exceptionally quick and effective. Text message broadcasts allow you to communicate with multiple individuals at once.

When making a phone call would be improper, texts can be utilized to communicate sensitive information as well as serve as a replacement for critical messages.

Learn more about Text messaging, here:

https://brainly.com/question/2532297

#SPJ5

The complete question is probably

Text messaging has grown in popularity as cell phones and other devices have proliferated. Which uses are appropriate business applications for text messaging? Check all that apply.

Texts can be used to discuss difficult topics you don’t want to address face to face.

Texts can be used to avoid colleagues you don’t like.

Texts can be used for marketing purposes to send sales messages.

Texts can be used as a substitute for receiving important messages when a phone call is inappropriate.

Why is computer called information processing machine ?????​

Answers

Computer is called information processing machine because they consist of both hardware and software. Accepts raw data as input and converts into information by means of data processing, it is called information processing machine..

byeee!

Program in C:

In this program you will be converting measurements from one unit to another.

Restrictions

No global variables may be used
Your main function may only declare variables and call other functions
Temperatures

From Farenheit Celsius Kelvin
Farenheit(F) F (F - 32) * 5/9 (F-32)*5/9+273.15
Celsius(C (C * 9/5) +32 C C + 273.15
Kelvin(K) (K - 273.15) * 9/5 + 32 K -273.15 K
Distances

From Inches Feet Yards Miles
Inches(I) I I / 12 I / 36 I / 63360
Feet(F) F * 12 F F / 3 F / 5280
Yards(Y) Y* 36 Y * 3 Y Y / 1760
Miles(M) M * 63360 M * 5280 M * 1760 M
Requirements

Users should be able to enter both upper and lower case letters for units
Any amount of white space should be allowed inputs
The program must compile with both -Wall and -Werror options enabled
Submit only the files requested
Use doubles to store real numbers
Print all doubles to 2 decimal points unless stated otherwise
Assumptions

Input is NOT guaranteed to be valid
If invalid input is received, your program should report it and terminate
Wait until we cover how to handle invalid input in class before dealing with this part of the problem
Tips

This problem is very large and you will want to break it down into many functions to help manage complexity
When reading in a character don't forget to put a space in front of the %c in scanf
You can save yourself a bit of work by always converting to a common unit and then converting to the desired unit
For example, always converting yards first and then from yards to the desired unit
The exit function in stdlib.h can be very helpful for ending a program early. If you use it make sure to do exit(0)
Examples

Example 1

Pick the type of conversion that you would like to do.
T or t for temperature
D or d for distance
Enter your choice: t
Enter the temperature followed by its suffix (F, C, or K): 0K
Enter the new unit type (F, C, or K): C
0.00K is -273.15C

Example 2

Pick the type of conversion that you would like to do.
T or t for temperature
D or d for distance
Enter your choice: d
Enter the distance followed by its suffix (I,F,Y,M): 5 y
Enter the new unit type (I,F,Y,M): i
5.00Y is 180.00I

Example 3

Pick the type of conversion that you would like to do.
T or t for temperature
D or d for distance
Enter your choice: J
Unknown conversion type J chosen. Ending program.

Example 4

Pick the type of conversion that you would like to do.
T or t for temperature
D or d for distance
Enter your choice: 10
Invalid formatting. Ending program.

Example 5

Pick the type of conversion that you would like to do.
T or t for temperature
D or d for distance
Enter your choice: t
Enter the temperature followed by its suffix (F, C, or K): 42 G
G is not a valid temperature type. Ending program.

Example 6

Pick the type of conversion that you would like to do.
T or t for temperature
D or d for distance
Enter your choice: t
Enter the temperature followed by its suffix (F, C, or K): 420 Blaze It
Invalid formatting. Ending program.

Answers

Answer:

C :)

Explanation:

Other Questions
Suppose that a random variable has a standard normal distribution. Use a standard normal table such as this one to determine the probability that is between 1.33 and 0.67.Give your answer in decimal form, precise to at least three decimal places.(1.33 The y axis is a line of symmetry for a triangle. The coordinates of two of its vertices are (-3, 2) and (0,5)A. What are the coordinates of the third vertex?B. What is the area of the triangle? How does terrell describe the living conditions for african-americans in washington, d. C. , during this period?. Could someone help me in this question? ty :) do you know what14 , 34 , 1 , 1 34 , 1 34 , 2 12 , 3 14 in plot form....? HELP PLS HELP IT EASY IT WORTH 30 POINTS Please help me with this. And thank you :) The distance, y, in miles, traveled by a car for a certain amount of time, x, in hours, is shown in the graph below: A graph titled Motion of a Car is shown with Time in hours labeled on x-axis and Distance from Starting Point in miles labeled on y-axis. The scale on the x-axis shows the numbers 1, 2, 3, 4, 5, 6, and the scale on the y-axis shows the numbers 0, 13, 26, 39, 52, 65, 78. There are three straight lines in the graph. The first line joins ordered pair 0, 0 with 2, 26. The second straight line joins 2, 26 and 3,26 and the third straight line joins ordered pair 3,26 with the ordered pair 5,52. Which of the following best describes the motion of the car shown? It travels for 2 hours, then stops for 3 hours, and finally travels again for 2 hours. It travels for 2 hours, then stops for 3 hours, and finally travels again for 5 hours. It travels for 2 hours, then stops for 1 hour, and finally travels again for 5 hours. It travels for 2 hours, then stops for 1 hour, and finally travels again for 2 hours. Question 3(Multiple Choice Worth 1 points) (05.01 LC) The graph below shows the height through which an elevator travels, y, in x seconds: A graph is shown with x axis title as Time in seconds. The title on the y-axis is Height of Elevator Above Ground in feet. The values on the x-axis are from 0 to 5 in increments of 1 for each grid line. The values on the y-axis are from 0 to 50 in increments of 10 for each grid line. A line is shown connecting points at ordered pairs 1,10 and 2, 20 and 3, 30 and 4, 40. The title of the graph is Rate of Ascent. What is the rate of change for the relationship represented in the graph? fraction 1 over 40 fraction 1 over 10 10 40 Question 4(Multiple Choice Worth 1 points) (05.03 MC) Barney wants to rent a tent. He has to pay a fixed base cost plus a daily rate for renting the tent. The table shows the amount of money, y, in dollars, that Barney has to pay for renting the tent for x days: Tent Rental Number of days (x) Rent (dollars) (y) 0 3 1 8 2 13 3 18 4 23 Plz help with as many as u can Mara thinks that she is as good as or better than her gemelo (twin), juan. Which of the following sentences would mara probably not say? yo limpio mejor que juan. Juan limpia ms que yo. Soy la mejor limpiadora de la casa. Juan limpia menos que yo. Write an equation that represents the line A) 9cmB) 12cmC) 15cmD) 36cm I need help with problem 14 the acceleration due to gravity on Mars if a person with a mass of 60.0 kg weighs 222 N. on Mars. Which line graph correctly reflects the information in the frequency table? Where is most of carbon dioxide on our planet stored?A. AtmosphereB. OceansC. ContinentsD. Humans Harper is writing a paragraph comparing and contrasting the Maori and Haida views on children. Which sentence best illustrates her point that both cultures believe the younger generation is extremely influential?In both the Maori and Haida myths, the children of the earth and sky collaborate to create the world.In both the Maori and Haida myths, children are largely responsible for the creation of humans and the earth.The Maori and Haida creation myths show that both cultures believe children are very important.Children are powerful and should be respected as shown by the creation myths of the Maori and Haida. **25 subtracted from the product of a number and 7 is less than -39.* Write the inequality shown by the shaded region in the graph with the boundary line 4x+3y=-3. 1. Can you suggest other way to create movement in visual art? How?