1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
15

Which scenario depicts an ethical workplace practice by a business owner

Computers and Technology
2 answers:
antoniya [11.8K]3 years ago
5 0

Answer:

This question is incomplete; the full one is the following:

Which scenario depicts an ethical workplace practice by a business owner?

a. sharing personal information of its employees with marketing agencies

b. sharing statutory personal information of its employees with law agencies

c. sharing internet browsing details of an employee with other employees

d. blaming human errors on technology bugs

e. allowing employees to make errors

The correct answer is letter "e. allowing employees to make errors".

Explanation:

Letter "e" is the most reasonable answer in terms of ethics, whether because it is conscious about human conditions and the possibility of always making mistakes, whether because it shows that a business owner has to think carefully about his/her employees. All the other options do not apply to the question because they are not ethical at all; all of them depict a business owner as someone who is intrusive and disrespectful, therefore, the last option is the most ethical among all the others.

(ps: mark as brainliest, please?!)

viva [34]3 years ago
4 0

The answer is D. It's asking for the most UNETHICAL not ETHICAL, the answer before me was ETHICAL. Sharing personal data is UNETHICAL.

You might be interested in
attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
bogdanovich [222]

Attackers frequently use ACK scans to circumvent a firewall or other filtering tools. During a NULL scan, all packet flags are enabled. The most recent versions of Nessus Server and Client are compatible with Windows, Mac OS X, FreeBSD, and the vast majority of Linux variants.

<h3>What is ack scan ?</h3>
  • ACK scans are used to identify hosts or ports that have been blocked or are resistant to other types of scanning. An attacker uses TCP ACK segments to learn about firewall or ACL configuration.
  • Attackers probe our router or send unsolicited SYN, ACK, and FIN requests to specific UDP/TCP ports.
  • TCP ACK Scan sends an ACK message to the target port to determine whether or not it is filtered.
  • On unfiltered ports, a RST reply packet will be sent for both open and closed ports. Filtered ports will either generate no response or generate an ICMP reply packet with an unreachable destination.
  • The TCP ACK scanning technique attempts to determine whether a port is filtered by using packets with the ACK flag set.

To learn more about ask scan refer to:

brainly.com/question/13055134

#SPJ4

3 0
1 year ago
Write a program that creates a dictionary containing the U.S. states as keys and their abbreviations as values. The program shou
AleksandrR [38]

Answer:

Explanation:

The following program is written in Python. It creates a loop that keeps creating a random number to randomly choose a State abbreviation from the dictionary. Then it asks the user what the state is. If the user gets the answer correct it prints out "Correct" and adds 1 point to the correct variables. Otherwise it prints "Incorrect" and adds 1 point to the incorrect variable. Finally, printing out the final amount of correct and incorrect responses. The program was tested and the output can be seen below.

import random

states = {"AL":"Alabama","AK":"Alaska","AZ":"Arizona","AR":"Arkansas","CA":"California","CO":"Colorado","CT":"Connecticut","DE":"Delaware","FL":"Florida","GA":"Georgia","HI":"Hawaii","ID":"Idaho","IL":"Illinois","IN":"Indiana","IA":"Iowa","KS":"Kansas","KY":"Kentucky","LA":"Louisiana","ME":"Maine","MD":"Maryland","MA":"Massachusetts","MI":"Michigan","MN":"Minnesota","MS":"Mississippi","MO":"Missouri","MT":"Montana","NE":"Nebraska","NV":"Nevada","NH":"New Hampshire","NJ":"New Jersey","NM":"New Mexico","NY":"New York","NC":"North Carolina","ND":"North Dakota","OH":"Ohio","OK":"Oklahoma","OR":"Oregon","PA":"Pennsylvania","RI":"Rhode Island","SC":"South Carolina","SD":"South Dakota","TN":"Tennessee","TX":"Texas","UT":"Utah","VT":"Vermont","VA":"Virginia","WA":"Washington","WV":"West Virginia","WI":"Wisconsin","WY":"Wyoming"}

keys_list = list(states)

correct = 0

incorrect = 0

while True:

   randNum = random.randint(0, 49)

   abbr = keys_list[randNum]

   answer = input("Enter The State name of " + abbr + ": ")

   if answer.lower() == states[abbr].lower():

       print("Correct")

       correct += 1

   else:

       print("Incorrect")

       incorrect += 1

   again = input("Play again? y/n ")

   if again.lower() == 'n':

       break

print("Correct: " + str(correct))

print("Incorrect: " + str(incorrect))

6 0
2 years ago
Samm1E49 ok my username is mosarider489 also if others want to join u can friend me
mixer [17]

Answer:

ok

Explanation:

3 0
3 years ago
Read 2 more answers
Is a display, or monitor, considered a piece of computer hardware
9966 [12]
Yes. The monitor is considered as a piece of Computer Hardware. Computer hardware is what you can physically touch, like the keyboard, mouse, monitor, disk drive, and so on.

I hope this answers your question.

Thank you,
Otaku
3 0
3 years ago
Which devices are managed through device management?
Ratling [72]
Answer:
computers and Mobile phones ( including game consoles and tablets) are managed through device management
Explanation:
Device management includes a type of security software used to monitor,secure and manage systems such as mobile phones computer laptops and desktops, Tablets and smart televisions as well as Game consoles. It as well involves the management,operation and maintenance of the physical aspect of the systems from external threats/intruders
Anti virus software is an example of a device management software used to protect systems from malware, by detecting and removing them and also by preventing them.
Firewall is a complete device management tool because it detects and prevents intruders and virus from penetrating the system software
7 0
2 years ago
Other questions:
  • How do you create a reference page in apa format with all websites?
    5·1 answer
  • What may happen if a large number of computer users are attempting to access a web site at the same time that you are?
    14·1 answer
  • You have four DCs in your domain. Active Directory appears to be corrupted on one of the DCs, and you suspect a failing hard dri
    5·1 answer
  • A robot worker and a human worker are both vulnerable to
    5·1 answer
  • What is your biggest takeaway on that subject?​
    8·1 answer
  • Write an algorithm to display your name 10 times​
    5·1 answer
  • Pls help will give brainlest!!! The image shows a line graph. Which scientist is most likely to use this visual aid in a present
    15·1 answer
  • Why do I keep getting points if I haven't answered anything? I don't want points.
    12·1 answer
  • What are the components of computer system??<br>​
    10·2 answers
  • Which two features offered by SharePoint
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!