1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kruka [31]
3 years ago
5

You are a software engineer at a company where management routinely encourages you and your colleagues to use pirated software.

What do you do?
Computers and Technology
1 answer:
s2008m [1.1K]3 years ago
7 0

Answer:

That’s highly illegal. You should notify them that it is illegal. And, if they continue, you should notify the legal team. If it continues, you either need to leave the company or notify the proper authorities.

You might be interested in
When a router fails to send messages in a timely fashion, this is a problem of the _____.
natima [27]
<span>network layer  

hope it helped</span>
4 0
3 years ago
What can you hold in your left hand but not in your right? for creese7911 and maranda66
Drupady [299]

Answer:

You're right hand or Left too

Explanation:

Because some people can hold some stuff on there hands

8 0
3 years ago
Read 2 more answers
what happens when you double-click on a file with an extension that represents an executable program?
Vlada [557]

Answer:

it will execute the file

Explanation:

3 0
4 years ago
A terrestrial biome is named according to the _____ in which a group of plants and animals occur together.
ikadub [295]

Answer:

Predominate Vegetation

Explanation:

3 0
4 years ago
10. When does teasing become cyberbullying?
Vlad [161]

Answer:

A) When the words, images or videos shift from humorous to hurtful.

Unlike kids who are being bullied, kids who are being teased can influence whether it continues or ends. If they get upset, the teaser usually stops.

4 0
2 years ago
Other questions:
  • What are "open-loop" and "closed-loop" systems
    11·1 answer
  • When using a file name you have to use only lower case letters<br>true or false
    11·1 answer
  • Here's another question!<br><br> What is some iterative programming structure uses?
    13·1 answer
  • Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this
    9·1 answer
  • A void function can return any value. TRUE FALSE
    8·1 answer
  • How do you mark someone brainliest? The person with the best explanation gets brainliest.
    11·2 answers
  • What does this say in morse code?
    11·2 answers
  • How do I fix this? It stopped adding up my points when i did one of the challenges.
    11·2 answers
  • Which of the following statements describes the general idea of an assistive media​
    7·1 answer
  • Moses wants to update the interface of a router. He plans on having a check on the current running configuration file and then w
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!