1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
2 years ago
8

A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac

hing data integrity. which technology would help the manager look into the activities of the team member? technology would be useful to look into the activities of the team member.
Computers and Technology
2 answers:
artcher [175]2 years ago
5 0

Computer forensics is a type of technology which would be useful to look into the activities of the fraudulent team member.

<h3>What is computer forensics?</h3>

Computer forensics can be defined as a type of technology which is designed and developed to gather, access, and monitor the activities of a particular user or users on a computer system and over the Internet.

This ultimately implies that, a type of technology which would be useful to the manager in looking into the activities of the fraudulent team member is known as computer forensics.

Read more on computer forensics here: brainly.com/question/19863626

#SPJ4

Zigmanuir [339]2 years ago
3 0

The technology that would be useful to look into the activities of the team member is the computer forensics

<h3>How to determine the technology?</h3>

Usually, when there is a case of data breach; the technology used to tackle the problem is the use of computer forensics.

This  is so because computer forensics involves identifying the storage of data on a computer system

Hence, the manager should make use of computer forensics

Read more about computer technology at:

brainly.com/question/1538272

#SPJ4

You might be interested in
_______ view focuses on the text and content of a document, without much information on the page layout.
Jlenok [28]
D is the mode in witch only or mostly text is visible.<span />
6 0
3 years ago
Create the following new exceptions: PokemonException, which extends the Exception class. It must have a no-parameter constructo
slamgirl [31]

Answer:

public class PokemonException extends Exception {

public PokemonException() {

super();

}

}

public class KantoPokemonException extends PokemonException {

public KantoPokemonException() {

super();

}

}

public class JohtoPokemonException extends PokemonException {

public JohtoPokemonException() {

super();

}

}

public class HoennPokemonException extends PokemonException {

public HoennPokemonException() {

super();

}

}

public class SinnohPokemonException extends PokemonException {

public SinnohPokemonException() {

super();

}

}

public class UnovaPokemonException extends PokemonException {

public UnovaPokemonException() {

super();

}

}

public class KalosPokemonException extends PokemonException {

public KalosPokemonException() {

super();

}

}

public class AlolaPokemonException extends PokemonException {

public AlolaPokemonException() {

super();

}

}

public class GalarPokemonException extends PokemonException {

public GalarPokemonException() {

super();

}

}

Explanation:

  • A separate Java file needs to be created for each of the following exception.
  • Inside the constructor, call the super() method to inherit all the properties of a parent class.
6 0
3 years ago
Changes in computer technology have an effect on _____.
dlinn [17]

Answer: Changes in computer technology have an effect on everyone.

6 0
3 years ago
Which attribute defines the file name for the specific image in an image tag??
serg [7]
Src="/absolute/or/relative/path/to/image.file"
6 0
3 years ago
How does a color change if you add more gray to it
Tom [10]
Gray isn't a color to be exact it a shade or what some people call it a shadow just like black but if you add more gray to a look lets say RED it will make it kinda faddy and more darker then it was

6 0
3 years ago
Other questions:
  • Computers are said to use binary data because all computer data is simply a series of Os and 1s.
    10·1 answer
  • 1. Why is it important to compare features of a computer before making a purchase?
    13·2 answers
  • Several days a week, usually between 8:00 a.m. and 9:00 a.m., users complain of MWI problems. Some have new messages, but their
    11·1 answer
  • Circular error are caused by adding the cell name of a/an cell to aformula
    7·1 answer
  • What type of engineer works on cleaning up oil spills?
    8·2 answers
  • Each processor core on a multi core processor generally runs faster than a single core processor
    14·2 answers
  • An inventory clerk, using a computer terminal, views the following on screen: part number, part description, quantity on hand, q
    8·1 answer
  • Exercise 4: Bring in program grades.cpp and grades.txt from the Lab 10 folder. Fill in the code in bold so that the data is prop
    12·1 answer
  • Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters.
    7·1 answer
  • Describe the job of an Architect.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!