1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hram777 [196]
4 years ago
11

A computer professional who has access to sensitive information shares this information with a third party. Which professional c

ode of conduct did the person violate? A. diligence in service B. company discipline norms C. confidentiality of information D. conflict of interest
Computers and Technology
1 answer:
GalinKa [24]4 years ago
7 0

Answer:

The answer is c.

Explanation:

hope this helps

You might be interested in
Ideally, how often should you back up the data on your computer? once an hour, once a day, once a month, once a year. Please hur
Stells [14]

Explanation:

Every month or so

5 0
3 years ago
Read 2 more answers
When leased computing resources can be increased or decreased​ dynamically, they are said to be​ ________.
damaskus [11]

<u>Answer:</u>

When leased computing resources can be increased or decreased dynamically, they are said to be Elastic resources.  

<u>Explanation</u>:

Elastic resources are the resources that are leased and they can be increased or decreased based on the number of users that are using the resource simultaneously. Popular example for elastic resource is Elastic Search EC2, where 2 to 4 servers are allocated to handle the service requests dynamically depending upon the usage. Cloud computing businesses  like Google and AWS Cloud depends on elastic resources.

4 0
3 years ago
Read 2 more answers
How many keys are on a microsoft windows standard keyboard
DiKsa [7]

There are 101 keys on a microsoft windows standard keyboard

7 0
4 years ago
Read 2 more answers
What can help you best learn about appearance, habitats and behaviors of birds in your area
Korvikt [17]

c microbiology textbook

8 0
3 years ago
Triggers can be created in operational systemsto keep track of recently ------------------ records.o Deletedo Updatedo Inserted
Crank

Answer:

Inserted

Explanation:

Triggers can be created in operational systems to keep track of recently inserted records.

3 0
3 years ago
Other questions:
  • What seems to be the prevailing opinion about enterprise clouds?
    8·2 answers
  • Identifying your learning preferences Helps You To
    12·1 answer
  • What does NVRAM stand for
    8·2 answers
  • What is the rationale behind the development of an operating system in computing?
    15·1 answer
  • What is an optimal Huffman code for the following set of frequencies, based on the first 8 Fibonacci numbers?
    8·1 answer
  • Explain the applications software that you use everyday
    5·1 answer
  • Your classmate is frustrated because the code that was designed to add up her five quiz grades is not working properly.
    12·1 answer
  • Please help with my Python code - Functions
    6·1 answer
  • Write a print statement that displays a random integer between 5 and 5000. Assume the random library is imported.
    12·1 answer
  • CLS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!