1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
8

Jason is computer professional who has access to sensitive information. He shares this information with another organization in

the same industry. Which professional code of conduct did Jason violate?
Computers and Technology
1 answer:
Temka [501]3 years ago
4 0

<em>Jason violated the </em><em>confidentiality of information. </em>

<em> </em>

<em>Part of information security is "confidentiality of information" wherein an employee must kept all the information he may acquire when he is working in a company, confidential. When we say confidential, he is not allowed to disclose anything that he may know about company's operation, sensitive information to anybody who is outside the company (like in the example, another organization). Because data that he might disclose may get on hands by company's competitors and it can be used against the company. They might steal ideas and strategies. </em>

You might be interested in
Manufacturing product designs must be tested before they are put into production. Who is responsible for this?
hammer [34]

For testing the designs of the product prior to putting it into production, mechanics should be responsible for the same.

The information related to the mechanics engineers is as follows:

  • They are responsible for manufacturing & designing of machines & products.
  • It is the engineering branch.
  • Moreover, they are fully responsible for developing things.

Thus we can say that for testing the designs of the product prior to putting it into production, mechanics should be responsible for the same.

Learn more related to the production here: brainly.com/question/22852400

4 0
2 years ago
Which is true about a computerized spreadsheet?
morpeh [17]
"A computerized spreadsheet automatically recalculates when changes are made to the data" is the one among the following that <span>is true about a computerized spreadsheet. The correct option among all the options that are given in the question is the third option or option "C". I hope it helps you.</span>
5 0
3 years ago
A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also
bekas [8.4K]

Answer:

The security principle being referred to here is:

Resource Encapsulation.

Explanation:

Resource Encapsulation is one of the cybersecurity first principles.  It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity.  Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.

7 0
3 years ago
When introducing a database into an organization, the database approach creates a more controlled and structured information flo
Karolina [17]

Answer:

a.cultural

Explanation:

Cultural impact generally refers to resistance to change in DBMS.It msu be assessed carefully. The Database management system is likely to have effect on functions,people and interactions.For example:- New roles might be given to already existing persons,new people might be hired.

8 0
3 years ago
. The _____________ is the responsibility of the CISO, and is designed to reduce incidence of accidental security breaches by or
irinina [24]

Answer: SETA program

Explanation:

 The SETA program is basically stand for the security, education, training and awareness. It is basically used to reduce the accidental security which is break by the organization member such as employees, vendors and contractors.

The SETA program provided various benefits to the organization as it improve the behavior of the employees.It basically enhance the training and education program by focus and concentrate on the information security.

It can also inform he member of the organization about the report of violating many policies.

7 0
3 years ago
Other questions:
  • Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
    6·1 answer
  • What is the best java 3d modeler library?
    7·1 answer
  • The term "resolution" refers to ______.
    6·2 answers
  • WHAT THE DEFINITION OD ENGINEER. No CHEAT
    5·2 answers
  • Creation of ____________will help you to study the behavior of the real system
    11·1 answer
  • why does planets orbit the sun? asap i give brainlist i know it on that subject i dont know what else goes with it
    10·1 answer
  • Describe in detail what each step would look like if you ran into a software error.
    7·1 answer
  • The _____ method randomly rearranges the items in the list provided in the parentheses.
    5·2 answers
  • true or false? multimedia components such as audio and video do not significantly contribute to increased computer network traff
    15·1 answer
  • ____________ are designed to delete temporary files (such as deleted files still in the Recycle Bin, temporary Internet files, t
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!