1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
1 year ago
8

A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac

hing data integrity. which technology would help the manager look into the activities of the team member? technology would be useful to look into the activities of the team member.
Computers and Technology
2 answers:
artcher [175]1 year ago
5 0

Computer forensics is a type of technology which would be useful to look into the activities of the fraudulent team member.

<h3>What is computer forensics?</h3>

Computer forensics can be defined as a type of technology which is designed and developed to gather, access, and monitor the activities of a particular user or users on a computer system and over the Internet.

This ultimately implies that, a type of technology which would be useful to the manager in looking into the activities of the fraudulent team member is known as computer forensics.

Read more on computer forensics here: brainly.com/question/19863626

#SPJ4

Zigmanuir [339]1 year ago
3 0

The technology that would be useful to look into the activities of the team member is the computer forensics

<h3>How to determine the technology?</h3>

Usually, when there is a case of data breach; the technology used to tackle the problem is the use of computer forensics.

This  is so because computer forensics involves identifying the storage of data on a computer system

Hence, the manager should make use of computer forensics

Read more about computer technology at:

brainly.com/question/1538272

#SPJ4

You might be interested in
I need help 50 points and brainless if you answer
Aloiza [94]

Answer:

Sure, what do you need help with

Explanation:

7 0
3 years ago
Complete the statement below with the correct term.
Lilit [14]

Answer:

<em>Every </em><em>couple</em><em> </em><em>of </em><em>month </em><em>or </em><em>whatever </em><em>you </em><em>give </em><em>it </em><em>to </em><em>someone</em><em> </em><em>else</em>

8 0
2 years ago
Without a well-designed, accurate database, executives, managers, and others do not have access to the ____________________ they
ohaa [14]

Answer:

Information

Explanation:

Good decisions are normally based on facts which are tangible information that can be analysed to show trends of key figures such as sales, income, production that are so critical in business. A well-designed and accurate database captures and stores these figures in an organised way which will enable the information or data to be analysed to make informed decisions.

6 0
3 years ago
Declare a typedef struct named jumper_t that will have four parts: character array name that is 16 in length, double array of tr
Maurinko [17]

Answer:

The typedef struct is as follows:

typedef struct jumper_t {

  char name[16];

  double tries[N_TRIES];

  double best_jump;

  double deviation;

} jumper_t;

The declaration of jlist is:

jumper_t jlist[10];

Explanation:

This defines  the typedef structure

typedef struct jumper_t {

The following declares the variables as stated in the question

<em>   char name[16]; </em>

<em>   double tries[N_TRIES]; </em>

<em>   double best_jump; </em>

<em>   double deviation; </em>

}

This ends the typedef definition

jumper_t;

(b) The declaration of array jlist is:

jumper_t jlist[10];

6 0
3 years ago
What are the differences between a cursor, insertion point and mouse pointer?​
Anna35 [415]

Answer:

Explanation:

A cursor is a pointer which indicates the position of the mouse on a computer's display monitor.

An insertion point is a location in a document where additional information is inserted when the user begins to type.

A mouse pointer is an image used to activate/control certain elements in a GUI (graphical user interface).

I know you asked for the differences, though i thought I'd add a similarity. All of these 3 things are similar, as they show where the position of the info/mouse is. :)

Hope this helps!

-Biscuit08

7 0
2 years ago
Other questions:
  • A ___________ is an algorithm for which it is computationally infeasible to find either (a) a data object that maps to a pre-spe
    5·1 answer
  • It is important that researchers design rigorous study methods to eliminate: a. inferences. b. the need for a CONSORT flow chart
    10·1 answer
  • Phoebe has to give a permission about recycling. Where should she look while presenting?
    11·1 answer
  • Which part of a computer takes the text and pictures on your screen and prints them onto paper?
    6·1 answer
  • Information about hardware engineers?
    9·1 answer
  • In news writing, which is bigger , a topic or a angle
    10·1 answer
  • Can someone follow my tt its c1ndy.dont.miss
    6·1 answer
  • A network device that is used to connect multiple devices together without segmenting a network is a __________.
    10·1 answer
  • A user calls the help desk reporting that a laptop with Linux freezes on startup and displays kernel panic. What could cause thi
    12·1 answer
  • Where else can the computer send the results of processing other than to output​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!