Answer:
We use it everyday for all sorts of stuff
Explanation:
The ethical responsibilities for computer professionals are:
Respect Confidentiality.
Maintain professional competence.
Respects and protection of personal privacy.
Explanation:
- Computer professionals are expected to conduct themselves in an ethical manner.
- Codes of ethics exist in this field to help these professionals make good decisions about the manner of their professional work.
- A computer professional must strive to provide the highest quality of work possible by acquiring and maintaining professional competence. He should be knowledgeable in the laws pertaining to his profession and not violate them.
- Respect Confidentiality : Confidentiality refers to protecting information from being accessed by unauthorized parties. Only the people who are authorized to do so can gain access to sensitive data. All the security incidents reported in the media today involve major losses of confidentiality.
- Maintain professional competence : The capability to perform the duties of one's profession generally, or to perform a particular professional task, with skill of an acceptable quality. Maintaining professional competence allows individuals to learn throughout their career, to develop technical skills, and to keep pace with accountancy changes.
- Respects and protection of personal privacy : Privacy computing includes all computing operations by information owners, collectors, publishers, and users during the entire life-cycle of private information, from data generation, sensing, publishing, and dissemination, to data storage, processing, usage, and destruction.
<span>In the admin console, three settings than an admin can set for the entire domain in gmail are to enable users to set their own themes in gmail, allow users to delegate their mail out to other users, and enable users to have the ability to import their email from other platforms like yahoo, web mail, or hot mail.</span>
Answer:
Data sequencing is the sorting of data for inclusion in a report or for display on a computer screen.
Explanation:
Answer:
packet sniffer
Explanation:
Q:
What tool would you use if you want to collect information as it is being transmitted on the n…
a. content filter
b. vulnerability scanner...
A:
packet sniffer