1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
azamat
3 years ago
6

A computer professional who has access to sensitive information shares this information with a third party. Which professional c

ode of conduct did the person violate?A.
diligence in service
B.
company discipline norms
C.
confidentiality of information
D.
conflict of interest
Computers and Technology
2 answers:
anastassius [24]3 years ago
8 0

The correct answer is C. Confidentiality of information

Explanation:

The Confidentiality of information is a principle of ethical and professional code that implies sensitive information of clients or others is protected appropriately and therefore is not shared with a third party or used for other purposes. In the case presented, the computer professional violated this principle because he had sensitive information and he shared it with a third party which means the information of other people was not protected appropriately which is against ethics because this information can be used maliciously.

Airida [17]3 years ago
6 0

The correct answer is c

You might be interested in
A news website uses 32-bit integers to count the number of times an article has been viewed. The website is becoming more popula
Irina-Kira [14]

Answer:

2^32 times as many values can be represented

Explanation:

32-bit. This means that the number is represented by 32 separate one’s and zero’s. 32 bits of 2 possible states = 2^32=4,294,967,296 possible values.

Integer meaning that only whole multiples of one are accepted.

Signed meaning that negative values are accepted. This halves the number of possible positive values (roughly), so the largest number you can represent is 2^31–1=2,147,483,647, but instead of 0, the smallest number you can represent is -2,147,483,648. An unsigned 32-bit integer, by contrast, can represent anything from 0 to 4,294,967,295.

7 0
3 years ago
Does anyone know how to by pass this pls help?
Triss [41]

Answer:

Yeah all you Gotta do is press download file

Explanation:

mark me brainliest!!

3 0
2 years ago
An administrative assistant types a document, saves, and prints. The assistant is using _____.
9966 [12]
The answer to your question is software. 
3 0
3 years ago
Assume the variable date has been set to a string value of the form mm/dd/yyyy, for example 09/08/2010. (Actual numbers would ap
bonufazy [111]

Answer:

String date = "21/05/2020";

String dayStr = date.substring(0,2);

int day = Integer.parseInt(dayStr);

System.out.println(day);

Explanation:

Create a variable called <em>date</em> which holds the current date

Create a variable called <em>dayStr</em>. Initialize it to the day part of the <em>date</em> using the substring method

Create a variable called <em>day</em>. Parse the <em>dayStr</em> and assign it to the <em>day</em>

Print the <em>day</em>

6 0
4 years ago
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
Mamont248 [21]

Answer:

false negative

Explanation:

A false negative is a dangerous state in which the IDS (Intrusion Detection System) assumes the activity as acceptable in which the activity is actually an attack occurred on the system.

That means, the Intrusion Detection System has failed to catch the attack. This is the most dangerous state, as the systems were compromised and the network or cyber security people were unable to find the attack.

More generally, there are two types of Intrusion Detection Systems ( IDS ). Network based IDSs ( NIDS ) and Host based IDSs ( HIDS ).

5 0
4 years ago
Other questions:
  • The primary role of the firewall is to: block unauthorized access to and from the system. quarantine any malware until it can be
    11·1 answer
  • 22 If you are involved in a violation and you do not have insurance to comply with the __________________, your driver license a
    9·2 answers
  • The only type of donation you can make to a not for profit is to donate money
    10·1 answer
  • Print and digital forms of communication, including television, newspapers, radio, and Internet, intended to convey information
    8·1 answer
  • if you wanted to predict the value of the y variable when the x variable is 15, you would be _____ the data. correlating extrapo
    14·2 answers
  • Design a Ship class with the following members:
    13·1 answer
  • True / False You should always consider your business requirements before deciding which designs are best for your environment.
    13·1 answer
  • Why were Redditors interested in "Mister Splashy Pants"?
    6·2 answers
  • Trong mạng internet, chúng tôi thay đổi công nghệ mạng LAN sang một công nghệ
    5·1 answer
  • Slide rule was an analog device invented by William oughtred in 1620 it is true or false​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!