1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
3 years ago
13

When something is not in accordance with the rules or standards for right conduct or practice, it is called

Computers and Technology
2 answers:
AnnyKZ [126]3 years ago
8 0
Unethical is the correct answer :)
SVETLANKA909090 [29]3 years ago
7 0
It would be called unethical
You might be interested in
Assignment 2: room area <br>programming python in Project Stem​
White raven [17]

Answer:I love Python, very useful

Explanation:python is very easy and user friendly!

8 0
3 years ago
FOR CALL OF DUTY MOBILE GAMERS PLS HELP!
statuscvo [17]

since the app are two different things its crucial to have a activision account, though the progress wont be reset unless you do have an activision account

8 0
3 years ago
which one of the following would not normally be found in an organization's information security policy?
kotegsom [21]

Requirement to use AES-256 encryption would not normally be found in an organization's information security policy.

When it comes to information security, organizations have a variety of different policies and requirements that they adhere to. One of those requirements is the use of AES-256 encryption.

However, not every organization has AES-256 encryption as a requirement in their information security policy. In fact, many organizations don't even know what AES-256 encryption is.

Why is AES-256 encryption relevant?

Well, AES-256 encryption is a strong form of encryption that is used to protect data. It is often used by governments and organizations to protect sensitive data.

AES-256 encryption is a requirement for many organizations because it provides a high level of security for data. Without AES-256 encryption, data could be compromised.

Learn more about information security policy here:

brainly.com/question/14292882

#SPJ4

4 0
2 years ago
Which actions changed the look of the following word?
Julli [10]
We need to see the word to know what it looks like to answer your question.
3 0
3 years ago
Read 2 more answers
Which is the most visual social media site?
Rus_ich [418]
That answer would be Twitter
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which type of wireless network is<br> controlled through a wireless<br> access point?
    7·1 answer
  • Specification of database requirements falls under which category of database​ administration?
    8·1 answer
  • If an appliance consumes 500 W of power and is left on for 5 hours, how much energy is used over this time period?
    5·1 answer
  • Why is it important to match the latencies fo the older modules to the newer modules?
    14·1 answer
  • Imagine a switch with three configured VLANs. How many IP subnets are required, assuming that all hosts in all VLANs want to use
    14·1 answer
  • Which feature enables you to make changes to all the slides of your presentation at the same time?
    8·1 answer
  • Anybody know any educational game sites unblocced in school besides funbrain and pb skids
    12·1 answer
  • Write a calculate_sq_inches_of_good_pizza function that accepts the diameter of a pizza and returns the area of the pizza minus
    7·1 answer
  • I have crummy WiFi and a bad pc. If I get a gaming computer, will it improve my FPS or ping?
    14·2 answers
  • to see additional functions available in an open desktop, document or website what action should the user perform?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!