1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tamaranim1 [39]
3 years ago
7

Jason is computer professional who has access to sensitive information. He shares this information with another organization in

the same industry. Which professional code of conduct did Jason violate?
A.) diligence in service
B.) company discipline norms
C.) confidentiality of information
D.) conflict of interest
Computers and Technology
2 answers:
Verdich [7]3 years ago
8 0
C will be your answer.
Fed [463]3 years ago
3 0

Answer:

C- CONFIDENTIALITY OF INFORMATION

Explanation:

Confidentiality of information is about privacy and respecting someone's wishes. Professionals shouldn't share sensitive details or information about their organisation or company unless that it is

absolutely necessary.

Confidentiality of information in other way means informations either in writing or orally should be confidential.

Confidentiality identifies sensitive information that, if disclosed, could damage the person or organization .

You might be interested in
Which of the following may present a problem for Linux users?
motikmotik
Tendancy to crash hope that helped
6 0
4 years ago
Read 2 more answers
What is modularity?
My name is Ann [436]

Answer:

Option D

Explanation:

Modularity in general defines the flexibility of a system. It is the degree to which a system can be broken down into smaller segments and then rearranged or recombines into new groups. Modularity is determined for multiple disciplines each having their own drawbacks.

8 0
3 years ago
You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away
Igoryamba

Answer:

The answer is "Option D".

Explanation:

It is a desktop platform that helps a "client" computer can join from a remote location to a "host" computer. Clients can then manage and then use apps and files anywhere on network protocols.

This technology enables users to link from the remote location to a specific machine as if they were sitting beside it. Once this connection is established, users can carry out a variety of tasks as if they actually use the computer directly.

4 0
3 years ago
Your corporation hosts a Web site at the static public IP address 92.110.30.123.
ivann1987 [24]

Answer:

Check the explanation

Explanation:

In line with the question, we can now derive that:

The router's outside interface IP address will be 92.110.30.65.

The router's inside interface IP address will be 192.168.11.254.

The Web site's IP public IP address will be 92.110.30.123.

The private IP address of the backup Web server will be 192.168.11.110.

and when we say IP address, it stands for Internet Protocol, it is a set of usual predefined rules which are utilized to administrate the manner to which data packets are sent over the internet. An IP address, which is typically just identified as an IP, is a sequence of figures used to uniquely recognize a computer/device on a particular network or on the internet space.

7 0
3 years ago
What is a functionalist perspective of cell phones, internet and personal computers?
Sedbober [7]
<span>As these technologies are rapidly evolving a functionalist would say that they unbalance the equilibrium of the social state, and is therefore undesirable as there is more interaction and adaptation of habits from other societies. But they also say that it's not a good thing to change immediately because it might disrupt the society. Therefore it has to change slowly. </span>
3 0
4 years ago
Other questions:
  • A/An is a series of instructions or commands that a computer follows; used to create software
    10·2 answers
  • Before you start creating a database, you should first use paper to plan, test, and revise. True False
    7·2 answers
  • What options does the business user have to manually share individual records? A new custom object is being created with a priva
    10·1 answer
  • When saving a PowerPoint presentation as a show which object will not be saved with the presentation
    13·2 answers
  • How to draw use case diagram
    13·1 answer
  • Write a program that dynamically allocates an array large enough to hold a user-defined number of test scores. Once all the scor
    5·1 answer
  • What form of communication are they using​
    15·1 answer
  • Easy coding question, please help.
    13·1 answer
  • Visual Design includes 4 elements: shapes, texture, lines and form.
    6·1 answer
  • QUESTION 9 / 10
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!