1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gelneren [198K]
3 years ago
7

Which of the following scenarios reflect communication that is ethical?

Computers and Technology
2 answers:
Paul [167]3 years ago
5 0
The scenario that reflects communication that is ethical would be scene D. 'Lorelei asks for permission from her mother so she can borrow her bag'. All the others does not display ethical communication because they violate the rules of integrity and respect. 
expeople1 [14]3 years ago
4 0
From the given choices, the scenario that is ethical is letter d or Lorelei asks for permission from her mother so she can borrow her bag. The other three scenarios is not just right and does not show any respect to others. Jeremy should have reported the crime right away not later. The company should not ask someone to just ignore policies at work. Lastly, Sheree should not demand instead she should ask politely if a project group could help her.
You might be interested in
Meta is a penetration testing engineer assigned to pen test the security firm's network. So far, she cannot tunnel through the n
Arte-miy333 [17]

In order to gain repeated and long-term access to the network system in the future, Meta should perform privilege escalation.

A penetration test is also referred to as pen test or ethical hacking and it can be defined as a cybersecurity technique that simulates a cyber attack against a user's computer system, in order to identify, test and check for exploitable vulnerabilities in the following:

  • Web software
  • Host device
  • Network

Hence, a pen test avails an end user the ability to exploit a weakness and potential security threats during vulnerability assessments of the system.

In Cybersecurity, privilege escalation can be defined as a process that involves the exploitation of a design flaw, software bug or configuration setting in a network, so as to gain repeated and long-term (elevated) access to the network or software application in the future. Thus, Meta should perform privilege escalation to enable her gain repeated and long-term access to the network system in the future.

Read more: brainly.com/question/24112967

7 0
3 years ago
When will it be determined whether or not a donor's organs are fit for recovery and transplantation?
myrzilka [38]
Organ viability is determined when a person is declared brain dead, so B.

4 0
3 years ago
Read 2 more answers
I need help fixing this please
Shkiper50 [21]

Explanation:

I think that you might have used it a lot or its just a glitch and will come back after some time.

It might be that your screen cracked.

But try re-booting if that does not work, wait and take off the battery.

5 0
3 years ago
Read 2 more answers
__________ is a computer tool for evaluating the risk of exposure to wildfires.
Brut [27]

Answer:

The statement is true

Explanation:

5 0
2 years ago
Read 2 more answers
Websites can have good content for a particular set of search phrases, yet rank poorly. Issues that may cause this to occur incl
raketka [301]

Answer:

B. deep organizational structure

Explanation:

A website with a deep organizational structure is a positive attribute that improves site performance.

5 0
3 years ago
Other questions:
  • Are we too dependent on technology if yes then can you please explain?
    12·2 answers
  • Bullets in a text box will do which of the following?
    9·1 answer
  • Find some search engine as many that you can find
    9·1 answer
  • A computer is unable to access the network. when you check the led lights near the computer's network port, you discover the lig
    6·1 answer
  • What is the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automa
    8·1 answer
  • How does it transform your ways of socializing
    11·1 answer
  • What does the Python print() function do?
    7·1 answer
  • On start up, which of these windows is not displayed ?
    15·2 answers
  • Write a static method reOrder56(int[] nums) that return an array that contains exactly the same numbers as the given array, but
    10·1 answer
  • Select the correct answer.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!