Which of the following is an ethical activity?


a) hacking
b) plagiarism
c) software piracy
d) algorithm refinement


d) algorithm refinement

Computer Science & Information Technology

You might also like to view...

To bring an object forward or send it backward, select the object you want to move, and click the Bring to Front, Send to Back, Bring Forward, or Send Backward command in the ____ group on the Drawing Tools Format tab.

A. Arrange B. Align C. Move D. Order

Computer Science & Information Technology

Each time you click the ____ button the selected text is enlarged.

A. Grow Font B. Stretch Font C. Enlarge Font D. Font

Computer Science & Information Technology

A company asked you help mitigate the brute force attacks carried out against its users’ Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system’s usability.   Which of the following should be included in securing the user accounts? (Select THREE.)

A. Require user account passwords. B. Require strong passwords. C. Change each account type to Administrator. D. Add each user to the Guests group. E. Set failed logon restrictions. F. Disable password complexity requirements.

Computer Science & Information Technology

In the figure above, the letter "B" points to what type of tab?

A. Left-Justified B. Right-Justified C. Center-Justified D. Align to Decimal

Computer Science & Information Technology