1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
asambeis [7]
3 years ago
15

Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a compet

itor. Ken has identified an email from the vice president and has tracked the information to the person at the other company. Ken has archived the evidence that proves the data has been sent. What should Ken do next?a. Report the person through proper channels.b. Approach the VP and ask him about the email.c. Ignore the email
Computers and Technology
1 answer:
yaroslaw [1]3 years ago
7 0
Report the person through proper channels
You might be interested in
Assignment 2: room area <br>programming python in Project Stem​
White raven [17]

Answer:I love Python, very useful

Explanation:python is very easy and user friendly!

8 0
2 years ago
A lost update occurs when
shutvik [7]

Answer:

Option A is the correct answer.

Explanation:

7 0
3 years ago
You are troubleshooting an issue where a PC can reach some hosts on the Internet (using either DNS name or IP address), while se
wolverine [178]

The options are missing from the question,below are the options to choose from;

A) incorrect (or missing) routes in a routers routing table

B) incorrect DNS configuration on the PC

C) incorrect default gateway configuration on the PC

D) duplicate IP addresses on your LAN

Answer: The correct answer to the question is option A

INCORRECT (OR MISSING) ROUTES IN A ROUTERS ROUTING TABLE.

Explanation: When it is possible for a PC to ping some devices but not actually all,we can then make an assumption that either it has a wrong subnet that is configured or the router from the path to the remote device actually has an incorrect or a missing routes to the device.

5 0
3 years ago
Why do people take off the keys on the school computers
beks73 [17]

Answer:

is this supposed to be a joke-

Explanation:

cuz i dont get it

8 0
2 years ago
Intelligent automation expands on simpler forms of automation through the use of which technology?
Firlakuza [10]

Answer:

Intelligent Automation (IA) is a combination of Robotic Process Automation (RPA) and Artificial Intelligence (AI) technologies which together empower rapid end-to-end business process automation and accelerate digital transformation..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

3 0
2 years ago
Other questions:
  • What is one way to process your thoughts about the information you are reading?
    14·2 answers
  • Can I change my brainly username?
    9·2 answers
  • You are driving in the right lane of a municipal road the road has three lanes in your direction ahead of you in the lane to you
    14·2 answers
  • Which of the following contains fair use?
    8·1 answer
  • When using social​ media, make sure to provide access to all the information needed to accurately process messages by following
    6·1 answer
  • What is outlook used for?
    14·2 answers
  • What offers backup services that use cloud resources to protect applications and data from disruption caused by disaster? Multip
    9·1 answer
  • Does anyone know what to do when brainly won't let you answer questions? I click on answer question and then it just sits there
    15·2 answers
  • When a customer makes an online hotel booking the database is updated by using
    9·2 answers
  • What will be displayed after this code segment is run?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!