1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
8

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals

is called a. profiling. b. phishing. c. spamming. d. targeting.
Computers and Technology
1 answer:
pantera1 [17]3 years ago
5 0
A.Profiling! Hope this helps
You might be interested in
What is Application Software ??
Paraphin [41]


Hi Pupil Here's Your Answer ::



➡➡➡➡➡➡➡➡➡➡➡➡➡


Application software and software that are created to facilitate/perform a specific type of real life application directly for the end user. These are available in the market as single readymade software or as an integrated package like MS Office, Visual Studio or Adobe integrated suite.


There are three types of application software which you would know about ::

# General Purpose Application Software.

# Special Purpose Application Software.

# Customized or Bespoke Purpose Application Software.


⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅




Hope this helps .........
6 0
3 years ago
Read 2 more answers
In computing, what does Bcc mean. The topic in which this is found is HOW TO CREATE AN E MAIL ACCOUNT ​
galina1969 [7]

Answer:

BCC stands for "blind carbon copy."

3 0
3 years ago
Read 2 more answers
1. What is the global marketplace?
podryga [215]

.......................................

4 0
3 years ago
Read 2 more answers
Explain the RISC and CISC architecture. Comparison of RISC and CISC in detail.
puteri [66]

Answer:RISC(reduced instruction set computer) is the computer used for low level operation by simple command splited into numerous instructions in single clock only and CISC(Complex instruction set computer) is the computer that performs the operation in single instruction.

RISC architecture has hardwired control unit,data cache unit,data path ,instruction cache and main memory as components .CISC architecture persist of  control unit,micro program control memory, cache, instruction and data path and main memory.

The differences between RISC and CISC are as follows:-

  • The instruction in RISC are less and and low complexes while CISC has several number of complex instruction.
  • The calculation done by RISC are precise and quick whereas CISC has slightly slow calculation processing.
  • The execution of RISC is faster as compared to CISC.
  • RISC uses hardware component for implementation of instruction because it does not persist its own memory and CISC implements instructions using its own memory unit .

6 0
3 years ago
Describe some of the moral, ethical, and legal issues surrounding responsible use of technology (and the information obtained th
rosijanka [135]

Answer:

Technology must be used in the right manner, and for the right purposes. When the latest in image processing is used to find a new planet through machine learning, we are right. However, when we kill somebody with a gun, we are not right. The bullet can be directed to legs rather than heart, and with continuous love and affection, any heart can be won. Sometimes this is allowed legally, Also it can be ethically correct as some institutions might allow it ethically, and it can be for some morally right as well. However, still, this is not right for some, and that is the almighty. And it's hard to match him morally or ethically. And for him nothing wrong is legal. Coming back to the use of technology in the workplace, you will find that you must follow the ethics of that institution, and your moral value must always be subsidiary to their ethics. And in the 21st century, and particularly in developed domains you will never be asked to sacrifice your moral value, and by the end of next quarter, this might be true for the whole world. Hence, ethics and moral values by then can in all cases be used interchangeably, However, when it comes to being legal, your institution will let you know all the laws, and you need to follow them, and these are applicable to all the institutions, and hence you need not require to sacrifice anything for being legal. Always remember that in the 21st century, you might see some very lethal technologies, and your job in the workplace is to study those technologies with your fullest potential. Issues will arise if you do not work with your fullest potential. And if you will, your moral value will be respected, and you will be easily able to obey their ethics, as no company ever think about even a little bad for their employees. And legally even the director is required to be correct just like you. And what is legal is being decided by the court and not any company. Hence, always try to work with your fullest potential, and never think to harm anybody, or your company. If you do this, you will be the hero of your company very soon.

Explanation:

And remember, the information that you get to know in your company is confidential, and you should not leak it to anybody, and even your relatives. Always keep them hidden inside you, and never ever try to leak them.

3 0
3 years ago
Other questions:
  • A blood bank maintains two tables - DONOR, with information about people who are willing to donate blood and ACCEPTOR, with info
    10·1 answer
  • To see a custom, object-specific action on the palette of the page layout editor: A. Click Layout Properties on the page layout
    11·1 answer
  • When a computer is booted the checks the computer's components?
    7·1 answer
  • After you set a pin for a domain account on your laptop, that pin can be used only on your laptop. question 17 options:
    7·1 answer
  • “identify the skill in the following scenario” :
    6·2 answers
  • What is the technological singularity and what are the dangers it brings to man
    12·1 answer
  • Your manager has asked you to write a program that displays the percentage of males and female in your class. The program should
    7·1 answer
  • Help plz. due yesterday
    13·1 answer
  • Classify the following as cross-section or time-series data: Gross sales of 200 ice cream parlors in July 2009
    8·1 answer
  • When creating an HTML document, what do we use to set aside space for content?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!