1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
3 years ago
10

Which of the following behaviors does not harm a company if your employment is terminated?

Computers and Technology
1 answer:
Romashka [77]3 years ago
6 0

Answer:

Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.

Explanation:

Trying to grab a copy of your work software can harm the company by potentially creating a security risk. There can still be residual files left by the company left in the software, and any virus or hackers that access your computer can find those files or connect to the company's cloud network.

Selling trade secrets will not only be bad for the company once your employment is terminated, but can actually lead to job termination itself because with those secrets out, competing companies can make identical products of the same (or better) quality for less money, which could result in a loss of profits or even going out of business. This is why non-disclosure agreements exist.

If you can still access company information even after you leave, this poses a security threat to the company because you can then sell that information to other companies or leak it online for everyone to see. Even if you don't do it yourself, a virus or hacker lurking on your computer would be more than happy to do it for you. That information could also be personal payment or identifying information of employees and clients/customers, which could cause people to lose trust in the company.

The best thing to do to avoid facing these consequences and protect other people's information is to turn over your accounts and any information you have of the company and allow them to revoke your access to that information. This not only helps the company remain secure and profitable, but you also won't have to possibly deal with law enforcement and have fewer job opportunities as a result.

You might be interested in
Binary divide 1101011 by 111​
denis-greek [22]

is this computer subject

5 0
3 years ago
Read 2 more answers
An effective problem statement ensures that
swat32
The software design effectively addresses the issues
6 0
3 years ago
Which university first developed the use of email?
Arte-miy333 [17]

Answer:

Massachusetts Institute of Technology (MIT)

Explanation:

4 0
3 years ago
Which one bc im struggling
Setler79 [48]

Answer:

cant really see it

Explanation:

3 0
3 years ago
Computers help eliminate the repetitiveness of manual task how can this benefit you in your overall career?
rjkz [21]

Answer:

Explanation:

When I went to high school, our next door neighbor had a pet dinosaur. We used to have to do math problems that were incredibly long and tedious. Things like the gas laws. They involve 5 numbers with 2 decimal places and we were asked to find the 6th number.

Eventually we were taught to use log tables but by then we were too numb to care.

Computers however take repetitiveness in their stride. They don't gag at how many times they have to repeat an operation. They don't mind if they do it a thousand times or a million or 100 million times. Some algorithms like the Monte Carlo method depend on trying an operation a million times. Humans would go crazy if they had to do that. Computers can do simple algorithms a million times while the mouse is on the go command.

If you pick a job like a tax consultant, you will be glad not to do any more than knowing where the numbers that make up your data go.

Same with banks and insurance jobs. I'll bet there are many jobs in medicine that require repetitive calculations.

7 0
3 years ago
Other questions:
  • Abigail is interested in connecting her tablet that usually connects to a wireless network, to her personal computer that usuall
    11·2 answers
  • The expressionvecCont.empty() empties the vector container of allelements.
    13·1 answer
  • If your network subnet mask is /16, what is the maximum number of host ids available for this network?
    15·1 answer
  • ​PeroxyChem's IT staff was able to free its IT staff to spend less time on routine maintenance and more time on strategic tasks
    11·1 answer
  • When you use a script to create all of the tables for a database, you must start with the tables that don't have _______________
    15·1 answer
  • If a user receives a message whose tone and terminology seems intended to invoke a panic or sense of urgency, it may be a(n) ___
    13·1 answer
  • Which library research databases include information about articles published in magazines, journals, and newspapers? question 1
    7·1 answer
  • Typing with capital letters and exclamation points in an e-mail is an example of
    12·2 answers
  • Indica si los elementos de las imagenes son una materia prima o un material elaborado
    12·1 answer
  • In what real-life situations might you want to use the modulus operation in a program?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!