The advent of email in the business world surely has created new ground for moral dilemmas involving information access and privacy.Tony, a data analyst for a major casino, is working after normal business hours to finish an important project. He realizes that he is missing data that had been sent to his coworker Robert.Tony had inadvertently observed Robert typing his password several days ago and decides to log into Robert’s computer and resend the data to himself. Upon doing so, Tony sees an open email regarding gambling bets Robert placed over the last several days with a local sports book. All employees of the casino are forbidden to engage in gambling activities to avoid any hint of conflict of interest.
Tony knows he should report this but would have to admit to violating the company’s information technology regulations by logging into Robert’s computer. If he warns Robert to stop his betting, he would also have to reveal the source of his information. What does Tony do in this situation?

Answers

Answer 1
Answer: In my point of view, if I were Tony I will be making a tough a decision. First of all, accessing Robert's account is a big deal and Robert's gambling as well. If Tony were to report Robert's betting he will be forced to reveal his source of information and his violation as well. So if I were he, I would speak with Robert and tell him that I found out his gambling activity and will warn him and also confess his mistake in logging into his computer. 

Related Questions

Some Word processors miss some errors because....?
The software program you need to have to read PDF file, such as the PDF files you download from your My Courses page, isa. Adobe Reader. b. Shock Wave. c. Applet. d. Flash.
What is a computer ? what are the uses of computer​
To create an identical version of a slide you would click
If a speaker is delivering a presentation using WebEx, which allows them to give a presentation from their computer to anyone at any location in the world, which speaking format is being used?a. Face-to-Faceb. Interpersonalc. Distanced. Mediated

ICD-10-CM diagnosis codes are entered in Block 21 of the CMS-1500 claim. A maximum of __________ ICD-10- CM codes may be entered on a single claim

Answers

Answer:

The answer to this question is 12.

Explanation:

You can enter a maximum of 12 ICD-10-CM codes on a single claim.Since we know that the codes entered in CMS-1500 claim are in the block of 21 in ICD-10-CM diagnosis.This should be kept in mind always in medical insurance.

So we conclude that the answer to this question is 12.

The components of the 4-term contingency include:_________ A. Discriminative stimulus, the behavior, the reinforcer, the consequence
B. Motivating operation, discriminative stimulus, the behavior, the consequence
C. Motivating operation, prompts, behavior, the consequence
D. Motivating operation, discriminative stimulus, prompts, behavior

Answers

Answer:

The correct option is B: Motivating operation, discriminative stimulus, the behavior, the consequence

Explanation:

A 4-term contingency is regarded as an important factor when trying to understand behavior and why that behavior was exhibited as identified in Grafton's philosophy. The Four terms include the behavior, Antecedents (also known as the discriminative stimulus), the consequences of the behavior, and the fourth piece which is sometimes forgotten; the motivation behind the behavior.

Determine a freshman's likely first-year grade point average from the student's Scholastic Aptitude Test (SAT) score, high school grade point average, and number of extra-curricular activities. This is an example of:________a. estimation of a continuous outcome.
b. unsupervised learning.
c. classification of a categorical outcome.
d. prediction of a categorical outcome.

Answers

Answer:

D) Prediction of a categorical outcome

Explanation:

Prediction problems involves determining an unknown value from known variables otherwise called predictor variables. In this case the problem is to tell the likely grade outcome of a freshman having known his scores in SAT and high school grade points

Item 8 Item 8 Shelby Black runs a very successful hair salon in downtown Los Angeles. One of Shelby’s tasks is to input positive and negative customer reviews into her computer system. What type of information is Shelby gathering?

Answers

Answer: Feedback

Explanation: Feedback is the reaction obtained in the form of information from the task a person has performed or any product. It gives the review of the service that is given by the customer, user etc.The reaction that is obtained can be a negative feedback or positive feedback.

Both types of feedback is necessary because it helps in the improvement of the service. The negative reaction will helps to change/improve the service that is not liked by the customer and positive feedback tells about the services appreciated by the customer. So, Shelby is also keeping the feedbacks for the same purpose for her salon business.

Which of the following is used on a wireless network to identify the network name?

Answers

The service set identifier (SSID) of a wireless local area network is a group of characters that serves as a means of identification. Sometimes, SSIDs are referred to as "network names.”

What wireless network to identify the network name?

The header of packets carried over a Wireless Local Area Network contains a 32-character unique identification called the Service Set Identifier (SSID) (WLAN). When a mobile device tries to connect to the BSS, the SSID functions as a password.

When several networks run in the same physical location, this name enables stations to connect to the preferred network.

The group of Stations that may communicate with one another in an 802.11 network is referred to as the Basic Service Set. Access Points (APs) that offer a link onto a fixed distribution system, like an Ethernet network, may or may not be included in the BSS.

Therefore, Service Set Identifier (SSID) is used on a wireless network to identify the network name.

Learn more about wireless network here:

brainly.com/question/26651858

#SPJ5

you didnt provide the answers but i assume the answer you are looking for is the 

SSID .... (service set identifier)

An intranet is a way for a company or organization to protect copyrighted and other important information?

Answers

Note that an intranet is a private network contained and used only by an organization.

True is your answer, for only the people who have access to it, are ablt to access the information.

hope this helps

If this is true or false, it would be true

Hope this helps

-AaronWiseIsBae