1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
damaskus [11]
3 years ago
6

Why is monitoring email, voice mail, and computer files considered legal?

Computers and Technology
1 answer:
Sati [7]3 years ago
6 0

Explanation:

Monitoring someone's emails,voice mails and computer files is considered is illegal because you are accessing someone's personal information which is not regarded as  ethical .

There are certain reasons where one's email,voice mails and computer files can be monitored are as following:

  1. Protect the security information and security.
  2. Investigation of complaints of harassment.
  3. Preventing personal use of employer's facilities.
You might be interested in
In python:
viva [34]

Answer:

Following are the program in the Python Programming Language:

#set dictionary

d = { 'State' : 'Delhi', 'Country' : 'India'};

#reverse the dictionary.

revers = dict((v, k) for k, v in d.items())

#Displays the reversed dictionary.

print("Dictionary is: \n")

print(revers)

<u>Output</u>:

Dictionary is:  

{'Delhi': 'State', 'India': 'Country'}

Explanation:

Here, we set the dictionary data type variable "d" then, we set the variable in which we store the reverse of the dictionary in which key is converted into the value and value is converted into the key. and finally  we print the reverse dictionary.

4 0
3 years ago
An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task schedu
yarga [219]
<span>I would say a cyber attack.since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.</span>
5 0
3 years ago
What are the three modes of the 3D transform manipulator
MrMuchimi
The 3D transform manipulator is used to transform any object in a 3D scene and has three transform operation modes.
1. Translation mode<span>- allows mouse controlled translation in 3D view.</span>
2. Rotation mode - allows mouse controlled rotation in 3D view.
3. Scale mode - allows mouse controlled scaling in 3D view.
All these modes can be accessed on the Transform Orientation menu.



4 0
3 years ago
While you are working on your computer, it shuts down unexpectedly, and you detect a burning smell. When you remove the case cov
Virty [35]

Answer:

Replace the power supply

Explanation:

Usually, Capacitors burn up because of different factors.

- Exceeding operation voltage

- High Inverse voltage if is an electrolytic capacitor.

A tentative answer could be the battery, but usually the batteries damages are because wear out of them, that is, cycles of charging and discharging, a problem that could arise in the battery is related with the charge protection, this circuit cares that the battery only get the charge that it needs, in Li-po batteries is 3.7V, in some laptops is 24 V, if so the battery could explode or leaking acid.  

The mother-board is the "brain" and the Random Access Memory (RAM), they consume a lot of energy and usually heat up, but doesn’t produce increasing of voltage and its feed it by voltage regulators.

The only valid option is the power supply because the energy comes from a rectifier (made with diodes) and a voltage regulator that step-down the DC voltage output if by any chance the voltage increase or a diode burns up in the power supply the coupling capacitors or input capacitors in the computer will fail.

5 0
3 years ago
What happens when a user clicks Accept on a meeting request?
melomori [17]

Explanation:

Other events at that time are canceled, and the meeting cannot be canceled by the organizer.

The agenda is updated with the user’s contact information, and other events at that time are canceled.

The meeting cannot be canceled by the organizer, and the agenda is updated with the user’s contact information.

The meeting organizer is notified, and a copy of the meeting is added to the user’s Outlook calendar.

3 0
3 years ago
Read 2 more answers
Other questions:
  • How to open CD port in PC lenovo ideapad 330​
    14·1 answer
  • 2. What is the purpose of an outline? (1 point)
    8·1 answer
  • Please help?!
    11·2 answers
  • What are some things you can do to clean up your digital footprint.
    9·1 answer
  • Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and
    11·1 answer
  • Conclusion for primary memory
    15·1 answer
  • 75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro
    13·1 answer
  • How do you open an application on the macOS?
    11·2 answers
  • You have two identical print devices that are set up in a work room. Currently, the Windows print server has two printers config
    13·1 answer
  • Two types of storage memory​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!