Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a competitor. Ken has identified an email from the vice president and has tracked the information to the person at the other company. Ken has archived the evidence that proves the data has been sent.
?
What should Ken do next?

A. Report the person through proper channels.
B. Approach the VP and ask him about the email.
C. Ignore the email; it is not his job.
D. Go right to the president of the company.


Answer: A

Computer Science & Information Technology

You might also like to view...

A virus ____ is a section of program code that can be used to identify a known malicious program.

A. flag B. signature C. definition D. scan

Computer Science & Information Technology

____ relates to how much one module in a program must rely on another.

A. Coupling B. Cohesion C. Orthogonality D. Reusability

Computer Science & Information Technology

Before you can use an array, you first must declare it.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The primary goal of implementing network QoS features is

A. Provide predictable network performance. B. Increase network throughput. C. Prevent undesirable network traffic from entering the network. D. Provide fault tolerance to the network design

Computer Science & Information Technology