1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
3 years ago
10

Which of the following behaviors does not harm a company if your employment is terminated?

Computers and Technology
1 answer:
Romashka [77]3 years ago
6 0

Answer:

Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.

Explanation:

Trying to grab a copy of your work software can harm the company by potentially creating a security risk. There can still be residual files left by the company left in the software, and any virus or hackers that access your computer can find those files or connect to the company's cloud network.

Selling trade secrets will not only be bad for the company once your employment is terminated, but can actually lead to job termination itself because with those secrets out, competing companies can make identical products of the same (or better) quality for less money, which could result in a loss of profits or even going out of business. This is why non-disclosure agreements exist.

If you can still access company information even after you leave, this poses a security threat to the company because you can then sell that information to other companies or leak it online for everyone to see. Even if you don't do it yourself, a virus or hacker lurking on your computer would be more than happy to do it for you. That information could also be personal payment or identifying information of employees and clients/customers, which could cause people to lose trust in the company.

The best thing to do to avoid facing these consequences and protect other people's information is to turn over your accounts and any information you have of the company and allow them to revoke your access to that information. This not only helps the company remain secure and profitable, but you also won't have to possibly deal with law enforcement and have fewer job opportunities as a result.

You might be interested in
In order to see what the services status will be in a given runlevel, you would use what command?
Mrrafil [7]

Answer: chkconfig

Explanation:

6 0
2 years ago
When you save a presentation with a .potx file extension, which type of powerpoint file is created?
Elena L [17]
A file with the POTX file extension is a Microsoft PowerPoint Open XML Template file used to maintain the same layout, text, styles, and formatting across multiple PPTX files.
6 0
2 years ago
Which of the following statements opens the file info.txt for both input and output? a) dataFile.open("info.txt", ios::in &&
azamat

Answer:

Correct answer is D

Explanation:

open is a function in c++ programming language used to interact with files.The function takes two parameters as input

  1. File name
  2. mode

File Name

File name is a string name of file to be opened.This is a compulsory parameter for open method.

Mode

Mode is an optional parameter in open function.Following are the accepted values of mode parameter

Prefix ios:: is added to start of each

  1. in (Open file in input mode for writing data to file)
  2. out (Open file in output / read-only mode to read data from file)
  3. binary (Open file in binary format)
  4. ate (Set the starting point of file to the end of file. Default starting point of file is start of file)
  5. "trunc" (If file is opened multiple times all previous data is replaced with new data)
  6. app (All operations of output are performed the end of file)

Use | operator to use multiple modes at a time.

3 0
3 years ago
Read 2 more answers
What is the term for a set of actions carried out on inputs?
Ymorist [56]

Answer:

<u><em>Input Bindings</em></u> is the term that is used for actions carried out on inputs in automation process.

Explanation:

In Automation process different operation or tasks had been performed such as output, input, internal actions. These are known as action bindings.

At input terminal the actions that are being carried out are called Input bindings. A command is comes from control pin and data is comes from input pin. This input and control signal combines together and perform the action that is required by machine or device.

<em>This is the reason these actions performed at input device is called Input Binding.</em>

8 0
4 years ago
In the __________ Standard, chemical manufacturers, importers, and distributors are required to provide hazard information by wa
STatiana [176]

Answer is C: Hazard Communication

Hazard Communication Hazard (HCS 2012) provides a coherent and standardized approach to communicating the hazards of chemicals by way of Safety Data Sheets (SDSs) and labels on containers. However, Occupational Safety and Health Administration (OSHA) revised its HCS 2012. In it, they revised criteria for classification of chemical hazards, labeling provisions, hazard statements, and precautionary statements.  In addition, modifications were made to health standards substances to ensure requirements for labels and SDSs are consistent with the HCS 2012. According to OSHA’S standards, SDSs should periodically be reviewed and updated.

7 0
4 years ago
Read 2 more answers
Other questions:
  • What are the 7 basic components found in a computer tower
    5·2 answers
  • What types of scientific claims should be verified
    5·1 answer
  • When selecting current page from the print range, on the print dialong box it will print
    5·1 answer
  • If num is an int which expression always evaluates to true if num holds an odd number
    14·1 answer
  • _____ is the widely used transport layer protocol that most Internet applications use with Internet Protocol (IP).
    9·1 answer
  • What is the term for a calculation (using encryption technologies) based on the contents of a disk or file that are engineered s
    8·1 answer
  • Which type of microphone uses two metal plates?
    7·1 answer
  • What is the binary conversion of 179.187.223.21?
    11·2 answers
  • What is a photographic print made from a negative image?
    7·1 answer
  • On the new iOS version, can you save photos from ‘review confirmed photos’? If so, how? Thanks!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!