1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
2 years ago
13

Becuase privacy is personal customers, where should your data privacy efforts align?

Computers and Technology
1 answer:
Olenka [21]2 years ago
5 0
With your company’s goals
You might be interested in
What's a False statement about online time? A. Blue light from devices can make it hard to sleep. B. It's a good way to connect
mylen [45]

Answer:C

Explanation: This has no basis while the others have studied behind them.

4 0
4 years ago
Which type of password would be considered secure
max2010maxim [7]
Try using at least one capital letter and multiple number and symbols
Example: [email protected]#3
5 0
4 years ago
Read 2 more answers
What is the code i need to do
Greeley [361]
What section is it? I did the same thing a bit ago on edhesive
3 0
3 years ago
what happens when you double-click on a file with an extension that represents an executable program?
Vlada [557]

Answer:

it will execute the file

Explanation:

3 0
4 years ago
The ____ command can be used to view the contents of a record when it is anticipated that the record will need to be modified. I
GREYUIT [131]

Answer:

The correct answer is B)

Explanation:

The commit command allows us to:

• Consolidate, confirm

• committing refers to the idea of confirming a set of provisional changes permanently.

• A popular use is at the end of a database transaction.

•

The LOCK TABLE command should be used:

• when a lock of the mode specified in the table can be acquired.

• The command will wait for everything you need to get the lock,

• In case you cannot acquire the lock immediately, the NOWAIT option is specified so that the command cancels the transaction.

6 0
3 years ago
Other questions:
  • What is the maximum data transfer rate of an ieee 1394a device?
    5·1 answer
  • Create a script that asks for the visitor's weight in pounds and his/her height in inches. The program should then calculate the
    13·1 answer
  • Can somebody help me with this problem
    10·1 answer
  • You have found an old dusty computer in your basement that you can identify as an original IBM PC. You ask your friend if he kno
    15·1 answer
  • A(n _______________ is a pre-written formula that is built into excel
    12·1 answer
  • Which formal security-related process should take place at the beginning of the code creation project? Group of answer choices R
    13·1 answer
  • As a culture chnages so does its language<br><br> A.true <br> B.false
    5·1 answer
  • Which model represents any process in general?
    6·1 answer
  • True or false windows 98 and windows xp are examples of an operating system?
    12·1 answer
  • 192.132.44.154<br> yes because why not
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!