1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
3 years ago
11

HIPAA protects which of the following kinds of data?

Computers and Technology
2 answers:
Gelneren [198K]3 years ago
5 0
The answer is a i looked up the question and it says a
amm18123 years ago
5 0

The correct answer is B. Medical information

You might be interested in
HAS ANYONE HEARD OF THE GAME SCHOOL DAY
Musya8 [376]

Answer:

NO BUT IT SOUNDS FUN

Explanation:

I PROBABLY HAVE NOT HEARD OF IF BC IM HOMESCHOOLED :D

3 0
3 years ago
¿Cual es la ultima combinacion de celdas en Excel 365?
Furkat [3]
I need points but i don’t know so.
i really need points.
4 0
3 years ago
Ted wants to go out to a neighborhood park and shoot pictures of dew drops on grass. He wants to get a low-level angle of the de
daser333 [38]

i believe that the answer to this question is c


8 0
3 years ago
Read 2 more answers
State the rule of 72 for the number of years to halve.
Nataliya [291]

The "Rule of 72" is a simplified way to determine how long an investment will take to double, given a fixed annual rate of interest. By dividing 72 by the annual rate of return, investors can get a rough estimate of how many years it will take for the initial investment to duplicate itself.

4 0
3 years ago
A _______ occurs when access to a website is interrupted because there are to many simultaneous requests, and result in a ______
rjkz [21]

Answer:time out then denial of service

Explanation:

Cause I did it.

3 0
3 years ago
Other questions:
  • Which of the following is an occupation management group? Select the choice that best answers the question.
    15·1 answer
  • Using a wireless network without the network owner's permission is known as ________.
    15·1 answer
  • Exploring Arraylists. Remember that arraylists are good for adding and removing things, and that they are clock-cycle friendlier
    13·1 answer
  • Which type of systems development is characterized by significantly speeding up the design phase and the generation of informati
    11·1 answer
  • fill in the balenkes ) 1)there are ................................... function keys on the keybord 2)pressing the end key moves
    6·1 answer
  • Vpn stands for _____. very precise settings virtual private network virtual public network vice prestigious setup
    5·1 answer
  • 11111 Power 2 sovle ​
    14·1 answer
  • 2. Released in 1992, Street Fighter II, the revolutionary fighting game, was developed by which company?
    8·2 answers
  • In ip address 202.54.15.178, 15.178 is ______ address.
    8·1 answer
  • Is it true that if the user log out the computer will turn off automatically​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!