1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
4 years ago
7

Which of these scenarios depicts unethical workplace practice by an employee?

Computers and Technology
2 answers:
iren2701 [21]4 years ago
8 0

Answer:

D. revealing confidential data.

Explanation:

Revealing confidential information is an extremely unethical workplace practice by an employee. Engaging in this type of behaviour is not only frowned upon, but can potentially be illegal. The reason for this is that employees are given a certain level of trust when they work at a company. Revealing confidential information violates this trust, and can risk the company's future.

Zina [86]4 years ago
3 0

Answer:

D. Revealing confidential data.

Explanation:

Confidentiality refers to protecting information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data. Imagine your bank records.

When confidential data is revealed it is very unethical at workplace.

You might be interested in
<img src="https://tex.z-dn.net/?f=954-696-0879" id="TexFormula1" title="954-696-0879" alt="954-696-0879" align="absmiddle" class
PSYCHO15rus [73]
The answer is -621 (that’s what my calculator said).... btw why didn’t you just use a calculator for this...?
5 0
3 years ago
A computer's hard disk drive holds 8 x 10^10 bytes of information. If Jill buys an extra memory stick that holds 5.1 X 10^8 byte
denis-greek [22]

Answer:

The computer will store 8.05 *10^10 bytes of information.

Explanation:

This is the same as saying that the computer will now have 80.51 Gigabytes ( 1gb = 1.000.000.000 bytes) of storage. In this case, the number is represented in its decimal form, and the previous one is displayed in Scientific Notation.

8 0
3 years ago
What is Virtual Storage Configuration and Management, as well as Virtual Machine Management?
AveGali [126]

Answer:

Virtual storage configuration and management refers to the process of configuring and managing the storage resources of a virtualized environment. This typically involves creating and configuring virtual disks, assigning storage space to virtual machines, and managing the allocation of storage resources among different virtual machines.

Virtual machine management, on the other hand, refers to the process of managing the virtual machines in a virtualized environment. This typically involves creating and configuring virtual machines, installing and configuring operating systems and applications on the virtual machines, and managing the allocation of computing resources such as CPU, memory, and network bandwidth among different virtual machines.

An example of virtual storage configuration and management would be creating a virtual disk with a specified size and assigning it to a virtual machine to use as its primary storage. An example of virtual machine management would be creating a new virtual machine with a specified operating system and allocated resources, and then installing and configuring applications on it.

Both virtual storage configuration and management and virtual machine management are important tasks in a virtualized environment, as they help to ensure that the virtual machines have access to the necessary storage and computing resources to function properly. These tasks are typically performed by system administrators or other IT professionals who have expertise in virtualization and IT infrastructure management.

7 0
2 years ago
The technique helps you explore possible risks by providing access to risk areas identified in the past. It also provides the so
Elza [17]

Answer:

The technique helps you explore possible risks by providing access to risk areas identified in the past is explained below in details.

Explanation:

Risk administration commences with the system of classifying risks. In this method, we examine future developments or circumstances that may influence our understanding and capacity to accomplish our aims. Risk identification incorporates estimating out where, when, how, and why such situations may happen.

7 0
3 years ago
Is a three-prong grounding plug with the third pong broken-off safe to use.
ad-work [718]
What is the answer choices dude
8 0
3 years ago
Other questions:
  • Which resource do programmers sometimes have to refer to and use during planning the logical steps of the solution?
    10·2 answers
  • Climate is considered a(n) _______ limiting factor. (2 points)
    9·1 answer
  • What is output by the following C# code segment?int temp;temp = 180;while ( temp != 80 ) {if ( temp &gt; 90 ) {Console.Write( "T
    7·1 answer
  • (5 pt.) The name of a variable in the C programming language is a string that can contain uppercase letters, lowercase letters,
    15·1 answer
  • Programs are normally stored in ________ and loaded into main memory as needed. the input device the output device secondary sto
    15·1 answer
  • Files and folders in UNIX can be removed using the
    8·1 answer
  • Alicia uses a software application to store the names, email addresses, and phone numbers of her friends in alphabetical order. 
    11·1 answer
  • Match the following.
    8·1 answer
  • You decided to upgrade your PC with a faster processor. To do this, you ordered a new motherboard over the Internet that support
    10·1 answer
  • Which of the following statements describes the general idea of an assistive media​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!