1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
3 years ago
9

Which of the following behaviors does not harm a company if your employment is terminated?

Computers and Technology
1 answer:
saul85 [17]3 years ago
3 0

Answer:

D. notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave

Explanation:

Assuming your employment is terminated, notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave is a behavior that would not harm a company. In the true and actual sense, making such suggestions is commendable because it would go a long way to cause more good rather than harm the company.

Some mischievous and malicious employees would rather not tell so they can still have an unauthorized access to the company's account and perpetrate various level of evil.

Hence, it is a good global practice to have a company's login credentials updated whenever an employee's employment is terminated.

You might be interested in
What is remote assistance?
Slav-nsk [51]

Answer:

Quick Assist, Windows 10 feature, allows a user to view or control a remote Windows computer over a network or the Internet to resolve issues without directly touching the unit. It is based on the Remote Desktop Protocol.

Explanation:

.....

3 0
3 years ago
What process identifies and grants access to a user who is trying to access a system? A. Credibility
xeze [42]

Answer:

Option C is the correct answer for the above question

Explanation:

Authentication is used to grant a person to use the system so that no other person can hack the data of the system. It is done by some unique id which is provided to the user of that system. When any person wants to use the system he needs to use that a unique id and sometimes password and some other information to use the system.

The above question asked about the process through which the user of the system grants access to use the system only. So the process is Authentication. hence Option C is correct because it states about the process Authentication while the other is not because--

  • Option a states Credibility which is not the process to enter the system.
  • Option b states Authorization which is used if the system gives access to the user, not the user can take on its own.
  • Option d states Honesty which is not the process to enter the system.
8 0
2 years ago
By using the Office Button Wird and PowerPoint will print your document without displaying an options dialog box
Vinvika [58]
What do you mean by that?
4 0
3 years ago
Prolog uses ____. Select one: a. lowercase for variable names, and uppercase for constants and functions b. uppercase for variab
Afina-wow [57]

Answer:

b) uppercase for variable names, and lowercase for constants and functions  

Explanation:

Given

Programming language: prolog

Required

The case type for variables, constants and functions

In prolog,

Variable names begin with uppercase

e.g. Name, NAME

While constants and functions begin with lowercase

e.g. name, addnumbers()

<em>Hence, (b) is correct</em>

6 0
2 years ago
What happens to the Menu Bar when the<br> object (image, shape, etc.) is "active"?
nexus9112 [7]

Answer: Ok so Sorry about this but I will answer thing at 10:20 tommorow I promise

Explanation:

5 0
2 years ago
Other questions:
  • When you were configuring Encrypting File System (EFS) in the lab, a __________ on the Documents folder in the File Explorer ind
    5·1 answer
  • from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
    13·1 answer
  • ______ is using material created by others without obtaining permission from the original authors.
    10·2 answers
  • Which tab on the ribbon houses the sort functions?<br><br> Insert<br> Data<br> View<br> Home
    11·1 answer
  • The area of a square is stored in a double variable named area. Write an expression whose value is length of the diagonal of the
    6·1 answer
  • What color is the smartart tolls tab?
    5·1 answer
  • Hey guys, I don’t have a problem for you but If anyone knows do you still pass your grade level if you failed 1 class in the las
    11·2 answers
  • Which data type can store decimal or fractional numbers?
    15·2 answers
  • Which option is used in emails to inform the recipient that they should exercise discretion in accordance with sharing the conte
    10·1 answer
  • 9 dmz, vpn, vlan where in the network do you place a dmx, why, what attacks are prevented? what does a vpn do, provide an exampl
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!