1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
azamat
3 years ago
6

A computer professional who has access to sensitive information shares this information with a third party. Which professional c

ode of conduct did the person violate?A.
diligence in service
B.
company discipline norms
C.
confidentiality of information
D.
conflict of interest
Computers and Technology
2 answers:
anastassius [24]3 years ago
8 0

The correct answer is C. Confidentiality of information

Explanation:

The Confidentiality of information is a principle of ethical and professional code that implies sensitive information of clients or others is protected appropriately and therefore is not shared with a third party or used for other purposes. In the case presented, the computer professional violated this principle because he had sensitive information and he shared it with a third party which means the information of other people was not protected appropriately which is against ethics because this information can be used maliciously.

Airida [17]3 years ago
6 0

The correct answer is c

You might be interested in
Question 18
beks73 [17]

Answer:

None

Explanation:

Logical operators:

'and' indicates that the statement is true if both conditions are true.

'or' indicates that the statement is true if one or both conditions are true.

Given that a = 1 and b = 10:

The first statement is false (1×10 <= 1 is false, 1 >= 10 is also false)

The second statement is false (1>10 is false, a does not equal b)

The third statement is false (a does not equal b)

None of these statements are true.

Hope this helps :)

8 0
3 years ago
In this chapter, you saw an example of how to write an algorithm that determines whether a number is even or odd. Write a progra
vagabundo [1.1K]

Answer:

// Program is written in Java Programming Language

// Comments are used for explanatory purpose

// Program starts here

public class RandomOddEve {

/** Main Method */

public static void main(String[] args) {

int[] nums = new int[100]; // Declare an array of 100 integers

// Store the counts of 100 random numbers

for (int i = 1; i <= 100; i++) {

nums[(int)(Math.random() * 10)]++;

}

int odd = 0, even = 0; // declare even and odd variables to 0, respectively

// Both variables will serve a counters

// Check for odd and even numbers

for(int I = 0; I<100; I++)

{

if (nums[I]%2 == 0) {// Even number.

even++;

}

else // Odd number.

{

odd++;

}

}

//.Print Results

System.out.print("Odd number = "+odd);

System.out.print("Even number = "+even);

}

8 0
4 years ago
Read 2 more answers
Rachel wants to use Microsoft Query to retrieve data from her corporate databases and files so that she doesn't have to retype t
Minchanka [31]

Answer:

Option: True

Explanation:

Microsoft Query can be used to retrieve data from external source such as databases. There are lots of databases or data sources which are accessible such as Microsoft Access, Microsoft Excel, Microsfot SQL Server OLAP Services, Oracle, Paradox, text file etc.

The steps mentioned in the question are correct. After finishing all the steps, user shall see the name of the data source will appears in the Choose Data Source dialog box.

8 0
3 years ago
Only the root user can modify a file that has the immutable attribute set.
Vladimir79 [104]
False if the roots modify it’s capable of it’s attributed set
8 0
2 years ago
With a word processor, you can create all of the following EXCEPT __________.
Nata [24]
You cannot create a database wurg a word processor
8 0
3 years ago
Other questions:
  • How to save customised keyboard shortcuts on word
    11·1 answer
  • Neighbor discovery performs many of the functions that icmp router discovery and icmp ____ handled in ipv4.
    13·1 answer
  • Which structure is the following true for? For _________, arguments are substituted exactly as entered, without checking for mem
    6·1 answer
  • Which statement best describes fonts from a serif font family?
    14·1 answer
  • What percentage of teens say they have witnessed cyberbullying?
    6·2 answers
  • This project must target a Unix platform and execute properly on our CS1 server.
    9·1 answer
  • Electrical data suitable for transmission is called a(n)
    5·1 answer
  • ***URGENT***
    8·1 answer
  • Sarah is a detall-oriented programmer. While testing her program, what other skill would she have to apply in order to detect al
    9·1 answer
  • look for ten websites and classify them as static or dynamic what makes each websites static or dynamic?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!