1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veseljchak [2.6K]
3 years ago
15

As we think of computer crime, there are ways in which thieves can steal your banking information through ATM machines. If you w

ere working for a company in IT, and had the ability to access every employee's personal data, and one of your best friends asks you for the phone number and address of one of the girls that works with you - would you give that friend the information? Why or why not?
Computers and Technology
1 answer:
Travka [436]3 years ago
4 0

Answer:NO, I WILL NOT GIVE THE TELEPHONE NUMBER

WHY?

IT IS A BREACH OF TRUST

IT IS A BREACH OF DATA PRIVACY

IT ALSO VIOLATES THE PRIVACY OF INFORMATION RIGHT OF THE GIRL.

Explanation:BREACH OF TRUST is act or actions taken against the signed agreement between a person and another party which may be any Organisation like a Financial Institution where the Financial Institution agrees not to release the personal Information about their customer without the person's consent.

IT IS A BREACH OF DATA PRIVACY many persons wants their data which are made available to Organisation to be kept private,divulging such information without the person's consent is a reach of data privacy.

It violates the privacy of Information right of the Girl, except for Security or other specified reasons no Organisations or person is given the right to divulge another person's right to a third party, ALL THESE VIOLATIONS ARE PUNISHABLE UNDER THE LAWS OF THE LAND.

You might be interested in
Using Karnaugh maps, simplify the following Boolean function:
Flura [38]

Answer:

F(a,b,c,d)=b'c' + a'cd' + ab'd'.

Explanation:

The image of the corresponding k-map is attached to this answer please refer it.By the sop given in the question the k-map is formed.There are 3 groups formed 1 group of four 1's and 2 groups of 2 1's.Hence there are three sop and the sop is reduced from the previous SOP.

8 0
3 years ago
Which statement best describes one reason why assembly language is easier
viktelen [127]

Answer:

machine language uses binary code and assembly language uses mnemonic codes to write a program.

Explanation:

In a nutshell, machine language uses binary code, which is almost impossible for humans to decipher, whereas assembly language uses mnemonic codes to write a program. Mnemonic codes make it simpler for humans to understand or remember something, and so make the language a bit easier for humans to use than machine code.

6 0
2 years ago
The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layou
zzz [600]

The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layout and visual design is known as context.

<h3>What is webpage context?</h3>

The web page context is known to be a kind of special ID that is is formed with all the new page load event.

The context of a website is known to be the point or place where a person can show their visitors that one care. It gives a kind of website's aesthetic appeal and the functional look.

Learn more about website design from

brainly.com/question/25941596

6 0
2 years ago
Smith wants to get a job in network systems. Which major should he choose to give him the best chance of getting a job?
Sever21 [200]
<span>computer engineering</span>
5 0
3 years ago
Read 2 more answers
Software created according to user choice​ true or false
solniwko [45]

Answer:

True

Explanation: so that everything we want is available that is why we can customize our interface.

3 0
3 years ago
Other questions:
  • The _____ contains a series of sections designed to prepare students for the ACT
    14·2 answers
  • What will be the value of i after the C statements at the right have been executed
    6·1 answer
  • If 15 bits are sent in 3 seconds then Bits intervalis__________
    13·1 answer
  • How do you screen shot and copy paste the screenshot from chrome book
    11·2 answers
  • A collection of realated files is called a
    12·1 answer
  • A surface
    6·1 answer
  • Different between internet and email​
    5·1 answer
  • Please help im not good at computer class ​
    10·2 answers
  • Describe comm<br>unication cycle​
    15·2 answers
  • Write a function called mul_time that takes a Time_Elapsed object and a number and returns a new Time_Elapsed object that contai
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!