1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
1 year ago
14

An IT Manager is reviewing the company’s approach to data privacy for a new project. What can happen if the company does not col

lect data from customers in a way that meets certain legal requirements?

Computers and Technology
1 answer:
photoshop1234 [79]1 year ago
5 0

Answer:

The company might not be able to satisfy their customers

You might be interested in
CHOOSE THE CORRECT CONTINUOUS TENSES( PRESENT CONTINUOUS,PAST CONTINUOUS AND FUTURE CONTINUOUS) : 1. I saw a snake while I _____
k0ka [10]

Answer:

Explanation:

joe biden>

7 0
2 years ago
A systems flowchart:
Musya8 [376]

Answer: (D)  Must always have a data store if there are paper documents involved.

Explanation:

 A system flowchart is basically responsible for displaying the data in the system and also control the flow of data. The system flowchart are basically use various graphic symbol for representing the systematic manner for processing the output.

It basically contain data store in the system if there is data documents present in the system so that it make easy to store the data in the system.

There are basically four symbols that is use to represent in the program flowchart is that are: Firstly start, processing, decision making and then end.

6 0
3 years ago
Mation about which osi layers of connected cisco devices can be verified with the show cdp neighbors comm
fgiga [73]
The show CDP neighbor command operates at the Data link layer (Layer 2)

Cisco Discovery Protocol (CDP) is a proprietary Data Link Layer protocol developed by Cisco Systems. It is used to share information about other directly connected Cisco equipment, such as the operating system version and IP address.

6 0
3 years ago
Olivia wants to change some settings in Outlook. What are the steps she will use to get to that function? open Outlook → File →
Rainbow [258]

Answer:

C.

Explanation:

edg 2020

3 0
2 years ago
Read 2 more answers
for java ?(Business: check ISBN-13)ISBN-13 is a new standard for identifying books. It uses 13 digits d1d2d3d4d5d6d7d8d9d10d11d1
ludmilkaskok [199]

Answer:

In Java:

import java.util.*;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 String isbn;

 System.out.print("First 1:2 digits: ");

 isbn = input.nextLine();

 if(isbn.length()==12){

 int chksum = 0;

 for(int i = 0; i<12;i++){

     if((i+1)%2==0){      chksum+= 3 * Character.getNumericValue(isbn.charAt(i));          }

     else{          chksum+=Character.getNumericValue(isbn.charAt(i));          }  }

 chksum%=10;

 chksum=10-chksum;

 if(chksum==10){

 System.out.print("The ISBN-13 number is "+isbn+"0");}

 else{

 System.out.print("The ISBN-13 number is "+isbn+""+chksum);          }   }

 else{

     System.out.print("Invalid Input");

 }     }}

Explanation:

See attachment for explanation where comments are used to explain each line

Download txt
6 0
3 years ago
Other questions:
  • Why is exception handling an issue for testers in object-oriented developments?
    15·1 answer
  • To paste text with the same formatting as the document in which it is entered, select _____ from the Paste menu. Keep Source For
    12·2 answers
  • Produce definition in computer
    12·2 answers
  • Ar count = 10;
    13·1 answer
  • A _____ defines what must take place, not how it will be accomplished.​
    12·1 answer
  • What is an Apple Pen?
    5·2 answers
  • What malware looks like a useful or desired executable program but is, in reality, a program that is supposed to cause harm to y
    11·1 answer
  • Jeremy has created a document that has images and a chart. The chart has to be updated manually, and double-clicking on the char
    15·1 answer
  • Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permi
    10·1 answer
  • 1
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!