1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allsm [11]
11 months ago
8

What is a privacy data breach

Computers and Technology
1 answer:
kotykmax [81]11 months ago
7 0

Answer: A privacy data breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority. A privacy breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority.

Explanation:

Examples of a  data breach might include:

Loss or theft of hard copy notes, USB drives, computers or mobile devices. an unauthorized person gaining access to your laptop, email account or computer network. sending an email with personal data to the wrong person.

You might be interested in
________ is the information about a file.
GalinKa [24]
Properties is the information about the file
4 0
2 years ago
It is important to analyze the sources and uses of cash because:___.
sergey [27]

It is important to analyze the sources and uses of cash because creditors use this information to assist them in deciding whether to loan funds to them. Investors use this information to decide if they will purchase their stock.

Managing your revenue is an important step to starting or investing in something.

Creditors always check and properly analyze the sources of cash before providing a loan to a lender. They do not invest in companies or people who are least likely to source and make cash in the coming time. Hence, your sources and uses shall be properly analyzed when presenting to creditors.

Investors, whenever investing in something will look at the benefits of the source they want to invest into. If a source is not likely to produce beneficiary revenue in the upcoming time, then investors will never invest in such a kind of source.

To learn more about investors, click here:

brainly.com/question/25311149

#SPJ4

5 0
2 years ago
_____ is(are) often used in reports to quickly represent data and help the readers understand the data.
Ira Lisetskai [31]
Tables are used<span> to </span>present <span>numerical </span>data<span> in a wide variety of publications from newspapers, journals and textbooks to the sides of grocery packets.</span>
6 0
3 years ago
Which resource do programmers sometimes have to refer to and use during planning the logical steps of the solution?
kenny6666 [7]
The answer would be a. pseudocode.

Pseudocode helps programs map out the logical pattern of how their program has to look. This means that by getting down the logical idea on how a program should look like, they will be able to implement this algorithm later on in the actual program. :)
3 0
3 years ago
Read 2 more answers
As a technical project​ manager, you have decided to propose implementing a prototyping methodology for a small​ web-based desig
Arlecino [84]

Answer:

B: Use the prototype and revise and enhance the prototype.

Explanation:

Before going ahead to execute any project, one must define the requirements for the project. It is only after the requirements for the project is known that one can go ahead to develop the prototype, use the prototype, revise and then enhance the prototype.

4 0
3 years ago
Other questions:
  • Recording music using a keyboard controller is commonly accomplished using which type of audio file format?
    13·1 answer
  • Drag each label to the correct location on the image.
    10·1 answer
  • Who invented the machine known as colossus?
    9·2 answers
  • A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB seri
    5·1 answer
  • Write a program that asks a user to enter a date in month day year format (for example 10 12 2016) and displays the day of the w
    5·1 answer
  • How scientist and technology beliefs society
    14·1 answer
  • In dos operating system ,write a command to delete the directory as well as the files of the directory ''world'' on drive E.
    15·1 answer
  • PLTW IM Chapter 1.2-1.3 i need this please
    9·1 answer
  • What does PR stand for ?
    15·1 answer
  • Trying to make the baseplate red and turn off can collide then the game waits 5 seconds and turns on can collide, making the bas
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!