1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
3 years ago
10

Which of the following behaviors does not harm a company if your employment is terminated?

Computers and Technology
1 answer:
Romashka [77]3 years ago
6 0

Answer:

Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.

Explanation:

Trying to grab a copy of your work software can harm the company by potentially creating a security risk. There can still be residual files left by the company left in the software, and any virus or hackers that access your computer can find those files or connect to the company's cloud network.

Selling trade secrets will not only be bad for the company once your employment is terminated, but can actually lead to job termination itself because with those secrets out, competing companies can make identical products of the same (or better) quality for less money, which could result in a loss of profits or even going out of business. This is why non-disclosure agreements exist.

If you can still access company information even after you leave, this poses a security threat to the company because you can then sell that information to other companies or leak it online for everyone to see. Even if you don't do it yourself, a virus or hacker lurking on your computer would be more than happy to do it for you. That information could also be personal payment or identifying information of employees and clients/customers, which could cause people to lose trust in the company.

The best thing to do to avoid facing these consequences and protect other people's information is to turn over your accounts and any information you have of the company and allow them to revoke your access to that information. This not only helps the company remain secure and profitable, but you also won't have to possibly deal with law enforcement and have fewer job opportunities as a result.

You might be interested in
State Whether the given statement are TRUE OR FALSE. 13X1=13
Naddika [18.5K]

Answer:

true

Explanation:

because everyone know that 13x1=13

7 0
3 years ago
A CPU has 32 KB cache, 2-way set associative, 16-byte block size. How many bits are required to use index each set in this cache
LenKa [72]

Answer:

10 bits

Explanation:

Cache size = 32 KB

We were also given that it is 2 way set associative

Block size = 16 bytes = 2^4 = 4 bits for offset

Number of blocks = cache size / block size = (32*2^10) / 16

=2^11

Hence, index = number of blocks / 2 (since 2 way associative)

=(2^11)/2 = 2^10 = 10 bits for index

7 0
3 years ago
Identify the end-to-end processes that should appear in the process landscape model.
antoniya [11.8K]

The end-to-end processes that need to appear in the process landscape model  are:

  • Design
  • Plan
  • Services
  • Stores, etc.

<h3>What are the end-to-end processes?</h3>

End-to-end is known to be a term that connote a process that takes a system or service from the start to finish.

Note that it often delivers a full functional solution, and it is one that is without needing to get  anything from a third party.

The process landscape is known to be made up of domain map that tends to captures core processes of industrial firms such as forecast to plan and others.

Hence, The end-to-end processes that need to appear in the process landscape model  are:

  • Design
  • Plan
  • Services
  • Stores, etc.

Learn more about landscape model from

brainly.com/question/7027022

#SPJ1

8 0
2 years ago
Which method tries all possible passwords until a match is found?
barxatty [35]
Brute force is this approach to password cracking. It tires all possible password combinations until a correct match between the hashes is found. It may make use of rainbow tables which contain precomputed password-hash combinations.

Please remember that it helps to provide the choices that match your question. This can help you get an accurate answer and have your question answered much quicker.
7 0
3 years ago
Describe encryption at gateways in thePresentation layer of the OSI Reference Model
puteri [66]

Answer:  

In the presentation layer of the OSI reference model provides a variety of coding and functions that can be applied in application layer data. Information send by the application layer are ensured by these functions. As, presentation layer is the important layer in the OSI reference model because it is responsible for important services like  data compression, data conversion, decryption and encryption.

Encryption at gateway is defined as, when the important data is first encrypted using protocol and then it is transferred in the network. And gateway re-director operates in the presentation layer.

4 0
3 years ago
Other questions:
  • What is the purpose for the refresh button?
    10·2 answers
  • Write a program that ask the user to enter air water or Steele and the distance that a sound wave will travel in the medium the
    6·1 answer
  • i will be doing an interview to someone so plz comment down below something random and you will automatically enter
    11·1 answer
  • Explain three applications of data mining
    14·1 answer
  • Label 14 parts of the inside of a computer
    6·1 answer
  • I will upvote....
    10·1 answer
  • How many pounds must a sand bag weigh to test if a safety net can absorb the proper amount of force? A. 150 lbs. B. 200 lbs. C.
    6·1 answer
  • Please HELP me it a test and it due rn. Please no links
    9·1 answer
  • What is a file path?
    7·1 answer
  • Resource _____ let you view, manage, and automate tasks on multiple aws resources at a time.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!