1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
8

Jason is computer professional who has access to sensitive information. He shares this information with another organization in

the same industry. Which professional code of conduct did Jason violate?
Computers and Technology
1 answer:
Temka [501]3 years ago
4 0

<em>Jason violated the </em><em>confidentiality of information. </em>

<em> </em>

<em>Part of information security is "confidentiality of information" wherein an employee must kept all the information he may acquire when he is working in a company, confidential. When we say confidential, he is not allowed to disclose anything that he may know about company's operation, sensitive information to anybody who is outside the company (like in the example, another organization). Because data that he might disclose may get on hands by company's competitors and it can be used against the company. They might steal ideas and strategies. </em>

You might be interested in
Each time an end user clicks a hyperlink, the browser generates a(n) _____ page request that is sent to the designated web serve
igomit [66]

Answer: HTTP GET

Explanation: There are many  HTTP(Hypertext Transfer protocol) requests sent to the server from the client .The page that gets request while the hyperlink page is clicked by the client, opens a HTTP GET page that belongs to the Internet protocol's(IP)suite by server. It is a process for the revival of the data from a particular server. The data does not get effected during the process of the retrieval.

3 0
3 years ago
What is the first step in devising security services and mechanisms?
N76 [4]

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

4 0
3 years ago
Read 2 more answers
In ipv4 addressing, each ip address is a unique ____ number.
Natali5045456 [20]
32-bit is the correct answer to this question.
4 0
3 years ago
Identify the 1950s programming languages. Choose all that apply.
erastova [34]

Answer:????????????????

Explanation: So sorry

6 0
3 years ago
In which step of the Systems Development Life Cycle (SDLC) are the logical and physical components defined?
QveST [7]

Answer: Systems design

Explanation: SDLC(Systems Development Life Cycle)  is the cycle that is responsible for the development of the system including several phases related to it.

The system design phase in SDLC works with the physical or hardware units and the logical reports to make a design interface. This phase makes the requirements of the cycle into design and present it for the analysis so that it can test the efficiency of it.

8 0
3 years ago
Other questions:
  • Antivirus software products require that you update _____ on a regular basis
    6·2 answers
  • While moving into a new apartment, Titus needed to hold the door open with something heavy. It suddenly dawned on him that he co
    9·1 answer
  • Which one of the following is a functional requirement? Select one: a. None of the mentioned b. Robustness c. Maintainability d.
    10·1 answer
  • What component can be used for user input or display of output?
    8·1 answer
  • Social media challenges third world country are facing​
    8·1 answer
  • Why save html documents as lowercase.?
    9·1 answer
  • Which type of electronic payment is typically favored in b2b?
    5·1 answer
  • Hard and soft skills can both be transferable skills. *<br><br> True<br><br> False
    5·2 answers
  • Write a program that reads a string and outputs the number of times each lowercase vowel appears in it. Your program must contai
    14·1 answer
  • Anyone know how to fix this problem on Microsoft Team?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!