SlideShare a Scribd company logo
1.
If you were Mimi, how would you handle this situation?
2.
What are the potential consequences if Mimi ignores Eldrick’s
actions?
3.
How can Mimi take advantage of Eldrick’s interest in Internet
resources to benefit
the store?
4.
Does Eldrick’s blog pose any security risk to the company?
Why or why not?

More Related Content

DOCX
Discuss how a successful organization should have the followin.docx
DOCX
Discuss how portrayals of violence in different media may affect hum.docx
DOCX
Discuss how culture affects health physical and psychological healt.docx
DOCX
Discuss how business use Access Control to protect their informa.docx
DOCX
Discuss how or if post-Civil War America was truly a period of r.docx
DOCX
Discuss how partnerships are created through team development..docx
DOCX
discuss how health and illness beliefs can influence the assessment .docx
DOCX
Discuss how geopolitical and phenomenological place influence the .docx
Discuss how a successful organization should have the followin.docx
Discuss how portrayals of violence in different media may affect hum.docx
Discuss how culture affects health physical and psychological healt.docx
Discuss how business use Access Control to protect their informa.docx
Discuss how or if post-Civil War America was truly a period of r.docx
Discuss how partnerships are created through team development..docx
discuss how health and illness beliefs can influence the assessment .docx
Discuss how geopolitical and phenomenological place influence the .docx

More from salmonpybus (20)

DOCX
Discuss how each of these factors (inflation, changing population de.docx
DOCX
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
DOCX
Discuss how business use Access Control to protect their information.docx
DOCX
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docx
DOCX
Discuss how and why companies use cryptography.Length, 2 pages..docx
DOCX
Discuss how an object must be an expert on certain sets of informati.docx
DOCX
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
DOCX
Discuss how Biblical worldview provides guidance to the Christian he.docx
DOCX
Discuss how an IPSIDS can protect user information on a Windows sys.docx
DOCX
discuss how a particular human-computer interface might impact a per.docx
DOCX
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
DOCX
Discuss emerging trends in the use of Internet currency such as Bitc.docx
DOCX
Discuss Edward Saids concept of Orientalism and its relationship .docx
DOCX
Discuss educational plans for preventing the spread of COVID-1.docx
DOCX
Discuss e-commerce its development and future perspectives. Sourc.docx
DOCX
Discuss different encryption methods that are specific to Microsoft .docx
DOCX
Discuss critical infrastructure and key resources (CIKR). What are t.docx
DOCX
Discuss differences in research findings regarding sentences imposed.docx
DOCX
Discuss cultural disparity in health care for the Hispanic commu.docx
DOCX
Discuss consensus-building activities you have been involved with .docx
Discuss how each of these factors (inflation, changing population de.docx
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
Discuss how business use Access Control to protect their information.docx
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docx
Discuss how and why companies use cryptography.Length, 2 pages..docx
Discuss how an object must be an expert on certain sets of informati.docx
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
Discuss how Biblical worldview provides guidance to the Christian he.docx
Discuss how an IPSIDS can protect user information on a Windows sys.docx
discuss how a particular human-computer interface might impact a per.docx
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
Discuss emerging trends in the use of Internet currency such as Bitc.docx
Discuss Edward Saids concept of Orientalism and its relationship .docx
Discuss educational plans for preventing the spread of COVID-1.docx
Discuss e-commerce its development and future perspectives. Sourc.docx
Discuss different encryption methods that are specific to Microsoft .docx
Discuss critical infrastructure and key resources (CIKR). What are t.docx
Discuss differences in research findings regarding sentences imposed.docx
Discuss cultural disparity in health care for the Hispanic commu.docx
Discuss consensus-building activities you have been involved with .docx
Ad

Recently uploaded (20)

PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
Cell Types and Its function , kingdom of life
PDF
Basic Mud Logging Guide for educational purpose
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Complications of Minimal Access Surgery at WLH
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Supply Chain Operations Speaking Notes -ICLT Program
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Cell Types and Its function , kingdom of life
Basic Mud Logging Guide for educational purpose
O7-L3 Supply Chain Operations - ICLT Program
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPH.pptx obstetrics and gynecology in nursing
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Renaissance Architecture: A Journey from Faith to Humanism
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Complications of Minimal Access Surgery at WLH
STATICS OF THE RIGID BODIES Hibbelers.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Ad

1. If you were Mimi, how would you handle this situation2.

  • 1. 1. If you were Mimi, how would you handle this situation? 2. What are the potential consequences if Mimi ignores Eldrick’s actions? 3. How can Mimi take advantage of Eldrick’s interest in Internet resources to benefit the store? 4. Does Eldrick’s blog pose any security risk to the company? Why or why not?