1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
3 years ago
13

A certain manager makes the following statement "Our internet company is in business for the money, making profits, and making t

he owners a lot of money and hence we really would prefer to keep our customers in the dark about how their personal data is being used to generate profits. Which ethical theory would you say this manager subscribes?
a. Property theory
b. Fiduciary theory
c.Normative theory
d. Stockholder theory
e takeholder theory
Computers and Technology
1 answer:
julia-pushkina [17]3 years ago
8 0

Answer:

d. Stockholder theory

Explanation:

The theory of maximising profits

You might be interested in
It is important to name your files in a variety of formats. true or false
blsea [12.9K]

True.You can bold important things or italicize them to make them more visible so you can find them easier and more efficiently.

<em>IMPORTANT FILES </em>pops out more than IMORTANT FILES

Good Luck :)

<em>Klicker</em>

3 0
3 years ago
Read 2 more answers
Which output will be displayed by the following program?
wolverine [178]

Answer:

h

Explanation:

5 0
2 years ago
Read 2 more answers
GIVING BRAINLIEST
irakobra [83]

Answer:

A: Radio waves.

Explanation:

Computers use short-wave radio in order to communicate with devices in it's immediate vicinity.

8 0
2 years ago
Alpha Technologies, a newly established company, wants to share information about its work with people all over the world. Which
allochka39001 [22]
It should use the web server to be accessible to users of World Wide Web across the world
6 0
3 years ago
What would be the most popular piece of technology on Earth?
spin [16.1K]

Answer:

the smart phone

Explanation:

It is the most widley used and accepted

8 0
3 years ago
Read 2 more answers
Other questions:
  • Encrypt the message ENCRYPTION using a tabular transposition cipher with encryption keyword ONE. If necessary, pad the message w
    7·1 answer
  • To name a computed field, follow the computation with the word ____ and then the name you wish to assign to the field
    8·1 answer
  • A typist is entering text on keyboard at the rate of 30 words per minute. if each word is 6 characters long on average, what ban
    5·2 answers
  • The countryside presents
    11·1 answer
  • A network administrator recently implemented two caching proxy servers on the network. how can the administrator best aggregate
    5·1 answer
  • Assume that the string oldSeq has been properly declared and initialized and contains the string segment. Write a code segment t
    6·1 answer
  • How to cancel branly subscription??​
    8·1 answer
  • Which of the following are valid variable names? Select 2 options.
    14·1 answer
  • What do you think Amazon should fix?
    13·2 answers
  • The different languages that follow specific RULES. These languages use commands
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!