1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
1 year ago
8

A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac

hing data integrity. which technology would help the manager look into the activities of the team member? technology would be useful to look into the activities of the team member.
Computers and Technology
2 answers:
artcher [175]1 year ago
5 0

Computer forensics is a type of technology which would be useful to look into the activities of the fraudulent team member.

<h3>What is computer forensics?</h3>

Computer forensics can be defined as a type of technology which is designed and developed to gather, access, and monitor the activities of a particular user or users on a computer system and over the Internet.

This ultimately implies that, a type of technology which would be useful to the manager in looking into the activities of the fraudulent team member is known as computer forensics.

Read more on computer forensics here: brainly.com/question/19863626

#SPJ4

Zigmanuir [339]1 year ago
3 0

The technology that would be useful to look into the activities of the team member is the computer forensics

<h3>How to determine the technology?</h3>

Usually, when there is a case of data breach; the technology used to tackle the problem is the use of computer forensics.

This  is so because computer forensics involves identifying the storage of data on a computer system

Hence, the manager should make use of computer forensics

Read more about computer technology at:

brainly.com/question/1538272

#SPJ4

You might be interested in
What cell address indicates the intersection of the first row and the first column in a worksheet?
Roman55 [17]
The answer is A1. 

The columns are arranged alphabetically, and the rows are ordered numerically. The cell address states the column, a letter, followed by the row, a number. The first cell address, the top-left cell of the sheet, is A1
7 0
3 years ago
Read 2 more answers
How will you keep the buzz going post-hackathon?
Anna71 [15]

Answer:

it would be nice if you gave some form of info here

Explanation:

in other words without information no help aka I'm slow and just need points

8 0
1 year ago
The variables xp and yp have both been declared as pointers to integers , and have been assigned values (i.e., they are each poi
Amanda [17]

Answer:

Following code are:

int *temp;   //declaration of variable

// perform swapping

temp = xp;    

xp = yp;

yp = temp;

Explanation:

we declare an integer data type pointer variable "*temp"  then perform swapping between them.

The variables "xp" and "yp" are already declared and these variables are performing swapping among three.

6 0
3 years ago
Consider the following code: x=random.randint (1, 100) The randint is a ____.​
Mrrafil [7]
Random integer, in this case betweeen 1 and 100
5 0
3 years ago
you are the it manager for your company. you have been asked to give the executive group the right to read, change, and assign p
inn [45]

The permission to give the executive group the right to read, change, and assign permissions to document is Give executive Change to shared permissions

<h3>What do you mean of executive?</h3>

An executive is seen as a kind of a powerful person  and they are the people that are known to be  responsible for making things go on or  run smoothly in any organization.

Therefore, The permission to give the executive group the right to read, change, and assign permissions to document is Give executive Change to shared permissions

Learn more about executive  from

brainly.com/question/838027

#SPJ1

5 0
2 years ago
Other questions:
  • Below is a chart representing portions of resumes from 3 applicants. Which best explains the applicants careers?
    11·1 answer
  • Describe the Sign in process of an Email account.​
    6·1 answer
  • 5. Write a program to remove any duplicate letters from a word and display the new word maintaining the original order. For exam
    12·1 answer
  • Who is hurt by piracy
    10·1 answer
  • A cathedral hull allows the boat to do what
    7·1 answer
  • When you gather primary or secondary data, what part of the market information management process are you participating in?
    8·1 answer
  • Given the following while() loop, which statement is true assuming A,B,C,D are int variables and A &gt; B? while ( ( A &gt;= B)
    8·1 answer
  • What is the behavior of an element with static positioning in regard to the page layout?
    12·1 answer
  • Por que se dice que la tecnología ha tenido muchos aportes positivos para la sociedad pero también nos ha hecho dependientes de
    9·1 answer
  • List the two page orientations in Microsoft word​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!