Locate the centroid of the volume obtained by rotating the shaded area about the x-axis.
IT 100 Week 14 Exam #3 (Tuesday, November 29, 2016) A. Wireless Security a. Wireless access poses additional security risks. b. Intruders intercept and monitor communications as they are sent/received. B. Ethics and Society a. Computer ethics i. Moral guidelines ii. Govern the use of computers, mobile devices, and information systems. b. Intellectual property unique and original works: ideas, inventions, writings, company and product names, and logos. c. Intellectual property rights rights to creators who are entitled to their work. d. A copyright protects tangible forms of expression. e. Digital rights management (DRM) strategy created to prevent illegal mo