1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
13

Which is an unethical use of technology and resources at the workplace?

Computers and Technology
2 answers:
dsp733 years ago
7 0

Answer:

B.sharing a coworker’s performance scores with your colleagues

Explanation:

Unethical use of technology can be catalogued as using or missusing the technology that the business has in the workplace, from the options the only one that is actually doing things that are unethical or without permission would be the second one because that is sharing something that no one has given you permission to share the information of the coworkers performance scores with all the people without his consent.

Greeley [361]3 years ago
6 0
The answer is B. sharing a coworker’s performance scores with your colleagues
You might be interested in
What answer best explains why improper netiquette is considered dangerous? Individuals who violate user policies are often charg
adell [148]

Answer:

Students become vulnerable to cyberbullying and harassment.

Explanation:

3 0
3 years ago
Read 2 more answers
Que son los sistemas de control con retroalimentacion
iren2701 [21]
Existen 2 clases comunes:
sistema de lazo abierto: la salida no efecto sobre el sistema
sistema de lazo cerrado: la toma de desiciones del sistema de la entrada si no también de la salida
5 0
3 years ago
The email application used by Jim’s office is sending emails with viruses attached to them to user’s computers. What step should
Finger [1]
Delete the program and install a new software.
5 0
3 years ago
Read 2 more answers
Which shortcut key aligns text to the center of the paige
borishaifa [10]

Answer:

ctrl e then ctrl r

Explanation:

i used google cause im a. gooooddddddddd

6 0
4 years ago
____ is the code of acceptable behaviors users should follow while on the internet; that is, it is the conduct expected of indiv
andriy [413]
The Computer Fraud and Abuse Act.
7 0
3 years ago
Other questions:
  • Which of these is a weakness of written communication?
    8·1 answer
  • Jason is creating a web page for his school's basketball team. He just finished creating his storyboard. Which tool should he us
    7·1 answer
  • Owning provides _________ flexibility but can lead to _________ costs in the long-term.
    7·2 answers
  • If you have a windows 8, but want the features of windows 8 pro, purchase and install _______.
    7·1 answer
  • When performing a basic search with Bing, you first type in your search expression and then click a button to begin the search;
    13·1 answer
  • What is the output of the following program?
    10·1 answer
  • Should the federal government have bug bounty programs? Why or why not?
    9·2 answers
  • Which sentence is an example of an I-statement?
    6·1 answer
  • Which 2 processes are operational processes
    10·1 answer
  • Hi um... i just wanna say hi :P
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!