1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
damaskus [11]
3 years ago
6

Why is monitoring email, voice mail, and computer files considered legal?

Computers and Technology
1 answer:
Sati [7]3 years ago
6 0

Explanation:

Monitoring someone's emails,voice mails and computer files is considered is illegal because you are accessing someone's personal information which is not regarded as  ethical .

There are certain reasons where one's email,voice mails and computer files can be monitored are as following:

  1. Protect the security information and security.
  2. Investigation of complaints of harassment.
  3. Preventing personal use of employer's facilities.
You might be interested in
5 What is the effect of the author proposing athought experiment at the beginning of the text? ​
jekas [21]

Answer:

Thought experiments are basically devices of the imagination. They are employed for various purposes such an entertainment, education, conceptual analysis, exploration, hypothesizing, theory selection, theory implementation, etc.

7 0
3 years ago
Read 2 more answers
Hilarious error messages
Lilit [14]

Answer:

F

Explanation:

7 0
3 years ago
Read 2 more answers
Your employer gives you a list of all chemicals in the entire building and the location of the SDS collection, and he asks you t
stepladder [879]
Employers should familiarize themselves with the training requirements that apply to their employees and their business; design and implement effective training programs; and use qualified trainers. In addition, employers should thoroughly document all training activities, and should retain records of employee attendance at all completed trainings. Training records should include the name of the trained employee, the date of training, the type of training and the training provider. It is a best practice for employers to keep documentation of all trainings provided to demonstrate compliance with all applicable laws and regulations.
4 0
4 years ago
Read 2 more answers
An attribute whose value uniquely identifies an object is called a(n) _______.​
Juliette [100K]
This is called a key attribute!

There are different types of key attributes!

Primary key is the key that is actually chosen, for example a social security number. 

There is also a unique key, say our finger prints! they also uniquely identify humans, but usually we prefer to use social security number when we list people (a unique key could be a primary key if we chose so)

We could also identify people by their social security number and a name, but this is unnecessary, as social security number already gives a full identification. Such a reduntant key is called super key. 
6 0
3 years ago
give your opinion on if you would trust your accounts with an online bank. Explain why or why not. MANY people do not. MANY peop
blagie [28]
I would not because you never know there could be hackers and they could get your card account and spend your money. If they get your card number and you do turn up with less money there is really nothing you can do about it at that point. That's why I wouldn't trust my money to an online bank. 

                                                   Hope this helps.
                                          Sincerely, Hodctilana
5 0
3 years ago
Read 2 more answers
Other questions:
  • A benefit of IPsec is __________.
    8·1 answer
  • Suppose you are given a data set consisting of nominal attributes, such as color, which takes values such as red, blue, green et
    9·1 answer
  • Two routers connect with a serial link, each using its S0/0/0 interface. The link is currently working using PPP. The network en
    6·1 answer
  • Knowing the meaning of the acronym WAS I WHY can be most helpful to you when you?
    14·1 answer
  • What is the command to list the contents of directors in Unix- like operating system
    10·1 answer
  • Neymar machine that Run on electricity
    11·1 answer
  • I ONLY HAVE 5 MIN HELPPPPPP
    15·2 answers
  • Each student has a record on a file consisting of the following data: Student last name, Student ID (numeric), GPA (a decimal nu
    7·1 answer
  • Why does my roku tv keep disconnecting from the internet.
    13·1 answer
  • scheduling is approximated by predicting the next CPU burst with an exponential average of the measured lengths of previous CPU
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!