1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnZ [28]
2 years ago
13

Addressing data privacy is a portion of which part of your internal processes?.

Computers and Technology
1 answer:
trasher [3.6K]2 years ago
7 0

The portion of a part of internal processes that addresses data privacy is: data hygiene.

<h3>What is Data Hygiene?</h3>

Data hygiene, which is also referred to as data cleaning, is an internal process that is run to detect and correct records that are inaccurate or corrupt and also identify incomplete or irrelevant parts of a data.

It also goes further in replacing, deleting, or modifying the coarse data. All these internal processes are data hygiene that addresses data privacy.

Therefore, the portion of a part of internal processes that addresses data privacy is: data hygiene.

Learn more about data hygiene on:

brainly.com/question/25099213

You might be interested in
Isla is writing a report on the best roller coasters in America. Which device could help her with this?
Ulleksa [173]

Answer: a device that can help could be a map.. she could learn about that place then see if its coasters are better.

Explanation: i dunno if i'm right

~shina~

4 0
3 years ago
Resources that can be saved through the use of computers​
Leona [35]

Answer:

Yes. That's what the internet is all about. Saving resources through interconnected computers.

6 0
3 years ago
_____ are different, even within the same job. a. Occupations b. Workplaces c. Careers d. Interest rates
pickupchik [31]
Hello,

Here is your answer:

The proper answer to this question is option B or "workplaces". Workplaces are where the person stays to do his or her job although they have the same job WORKPLACES are different.

Your answer is B.

If you need anymore help feel free to ask me!

Hope this helps!
3 0
4 years ago
Read 2 more answers
Comparison <br> Cloud computing and parallel processors
V125BC [204]

Anwser is 2/3

Explanation:

7 0
3 years ago
Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characte
Stels [109]
That would be your name and then you date of birth 
6 0
3 years ago
Read 2 more answers
Other questions:
  • Universal containers has included its orders as an external data object in to Salesforce. You want to create a relationship betw
    7·1 answer
  • What can you say about the following Java class definition?
    10·1 answer
  • A technician is troubleshooting a printer connected to a computer via USB. The printer will print using the controls at the prin
    9·1 answer
  • An adjustable wrench's movable jaw is positioned <br> by​
    5·1 answer
  • What are the atoms in grp one? periodic table. I am going to mark as brainliest ​
    12·1 answer
  • I need help ASAP please and thank you!
    14·1 answer
  • 100 POINTS!
    10·2 answers
  • States that processing power for computers would double every two years
    6·1 answer
  • Which directory stores the cron configuration file?.
    8·1 answer
  • 1.1 give five (5) reasons why modeling is an important part of system analysis and design
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!