1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
11

You are a project manager tasked to implement a critical application in a reputed bank. A client review indicates that you could

not adhere to the quality standards of the overall project. Which code of conduct have you violated?
A.diligence in service
B.company discipline norms
C.confidentiality of information
D.conflict of interest
Computers and Technology
2 answers:
Basile [38]3 years ago
6 0
A. diligence in service
Dmitriy789 [7]3 years ago
6 0

Answer

diligence in service

Explanation

Diligence in service is the process of systematically researching and verifying the accuracy of a statement It is normally required especially in business or organization to  validate financial statements.. It describes the degree of effort required by law or industry standard. so if you are a manger and a client  review indicates that you could not adhere to the quality standards of the overall project this shows that you have violated diligence in service.

You might be interested in
provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,
Oxana [17]

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

3 0
3 years ago
When keying, keep fingers curved and upright over the home keys.<br> False<br> True
Dmitry [639]

Answer:

This is true.

Explanation:

I think everyone was taught to to type correctly sometime in school or at home. It helps you proficiently type. But most people don't use the Home Room Key Technique. Most use the "Chicken peck"

3 0
3 years ago
Which tool lists active tcp connections?
dimaraw [331]
Netstat
Type netstat -a to get a complete overview.
8 0
3 years ago
To employ an access key, press and hold down the ____ key as you tap the access key.
Veronika [31]
To employ an access key, press and hold down the Alt key as you tap the access key.
4 0
3 years ago
Algorithm and flowchart:- calculate d=a+b-c​
Keith_Richards [23]

Answer:

a=c

hope it helps

4 0
3 years ago
Other questions:
  • PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
    7·1 answer
  • This is not an appropriate business use for a wiki. editing corporate documents getting customer feedback project management pub
    11·1 answer
  • "________ are used to edit videos to enhance quality and appearance."
    6·1 answer
  • Please check my answer! (Java)
    7·1 answer
  • Patronage of most Medieval musicians was supplied by the
    13·1 answer
  • to see which employees received 3 or more bonuses. use the highlight cells rules conditional formatting to format cells in the r
    6·1 answer
  • Which one is the right code
    10·1 answer
  • Why are mobile apps often easier to develop than desktop apps?
    11·1 answer
  • How do I give Brainliest?? I'll give brainliest...
    13·2 answers
  • A network administrator wants to authenticate server machines using Transport Layer Security (TLS). What can the administrator i
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!