1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
asambeis [7]
3 years ago
15

Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a compet

itor. Ken has identified an email from the vice president and has tracked the information to the person at the other company. Ken has archived the evidence that proves the data has been sent. What should Ken do next?a. Report the person through proper channels.b. Approach the VP and ask him about the email.c. Ignore the email
Computers and Technology
1 answer:
yaroslaw [1]3 years ago
7 0
Report the person through proper channels
You might be interested in
Using a pin or password in addition to tpm is an example of what type of authentication?
anzhelika [568]
Considering it is private i would say security?
3 0
3 years ago
Leo needs to consolidate data in multiple worksheets by performing a calculation across all worksheets on the same cells.
wolverine [178]
A do you think is the answer
4 0
3 years ago
Read 2 more answers
What happens to formulas with relative cell references when they are copied using the fill handle?
Masteriza [31]
The correct answer is D
4 0
4 years ago
What is the Difference between CUI and GUI
Fynjy0 [20]

Hi there!


GUI Means Graphical user interface


CUI means  Controlled Unclassified Information


Theres the difference they are completely different from each other.


PLEASE MARK BRAINLIEST

-WeasuLL

7 0
3 years ago
Read 2 more answers
The Windows Net use command is a quick way to discover any shared resources on a computer or server. True or False
V125BC [204]
Yes it’s true the window net use command is a quick way to discover any shared resources on a computer or server
8 0
3 years ago
Other questions:
  • Assign to avg_owls the average owls per zoo. Print avg_owls as an integer. Sample output for inputs: 1 2 4 3
    7·1 answer
  • What new deal programs were created to build dams to control flooding and generate electric power?
    13·1 answer
  • Which shortcut key combination will move the cursor to the beginning of the line
    10·1 answer
  • The java compiler requires that a source file use the ________ filename extension question 3 options: 1) .class 2) .h 3) .java
    8·1 answer
  • If you feel that an OSHA inspection is needed to get hazards corrected at your workplace, which is your best option?
    7·1 answer
  • Most large organizations store data through a strategy called a(n) ________ to promote efficient and safe use of data across the
    11·1 answer
  • 3 Points
    9·2 answers
  • Which social media post indicates your home may be unattended?
    10·1 answer
  • Aspiring graphic designers can earn a(n) certification for graphic design software, such as Photoshop and Acrobat.
    9·2 answers
  • Write the definitions for three functions named max. Each receives two parameters, of the same type, and returns the larger of t
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!