Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a competitor. Ken has identified an email from the vice president and has tracked the information to the person at the other company. Ken has archived the evidence that proves the data has been sent.
?
What should Ken do next?
A. Report the person through proper channels.
B. Approach the VP and ask him about the email.
C. Ignore the email; it is not his job.
D. Go right to the president of the company.
Answer: A
You might also like to view...
Answer the following statements true (T) or false (F)
1. Use decision trees when there are many repetitious actions. 2.Use decision tables when complex combinations of conditions, actions, and rules are found. 3. Use decision trees when not every condition is relevant to every action. 4. Use decision tables when you require a method that effectively avoids impossible situations, redundancies, and contradictions.
Describe how information about individuals is collected and compiled.
What will be an ideal response?
Tim needs the background of a text box to be green. He should do which of the following?
A. Change the shape effects. B. Change the shape outline. C. Change the shape fill. D. Change the shape position.
Experienced trainers find that more short breaks during a training session are preferable to fewer, long breaks.
Answer the following statement true (T) or false (F)