1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
3 years ago
11

HIPAA protects which of the following kinds of data?

Computers and Technology
2 answers:
Gelneren [198K]3 years ago
5 0
The answer is a i looked up the question and it says a
amm18123 years ago
5 0

The correct answer is B. Medical information

You might be interested in
In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy?​ What happens to ac
NemiM [27]

Answer : The securtiy of the password can be maitained by the shadow files such as:-

  • max is for the days that represent that the same password can be used without the need for changing it  
  • min is for the days that represent waiting days before the changing of password after he/she gets a new password
  • warn are the days that come with Waring sign that the password is going to expire soon.

For a certain period of time , the user can access the log in when the password has expired . If that period is timed out then there will be no log in option and the account gets disabled.

4 0
3 years ago
Is there apps/ websites like brainly?
Virty [35]

Answer:

Mathpix Snip, Socratic, Microsoft Math Solver....etc.

Explanation:

Hope this helps! :)

6 0
3 years ago
Read 2 more answers
what's the best mouse for fast clicking ? I play a lot of fps and a lot of pvp games I need a mouse that I can click fast with a
kondaur [170]
Alenware hp dell logtech, and i know others
7 0
3 years ago
In preparing categorical variables for analysis, it is usually best to a. combine as many categories as possible. b. convert the
Genrish500 [490]

Answer:

In the given question the correct option is missing, which can be described as follows:

"It transforms binary, null variables into the groups."

Explanation:

These variables are real variables, which could also take up a series of variables, that are either constrained or defined. This can be regarded as a listing. It is used to analyze and convert it, into binary in the following ways, and wrong choices can be described as follows:

  • In option a, It can't combine, it only converts.
  • Option b and Option c is wrong because, it can't convert numeric, it only convert binary number to dummy variables.

5 0
3 years ago
True or false? If you’re posting the same content across different channels, make sure you post them simultaneously—on the same
alukav5142 [94]

Answer:

The answer is true.

Explanation:

7 0
3 years ago
Other questions:
  • Look at the slide. How could the slide best be improved? By reducing the number of visual aids by increasing the font size by da
    8·2 answers
  • Which best describes inserting a table using the Table Gallery
    10·2 answers
  • Merge arrays A and B into array C using merge sort algorithm. Give final sorted numbers of C using colored numbers without showi
    13·1 answer
  • Why when i click home on iphone i still at my grandma house
    11·2 answers
  • Enter a word: Good<br> Enter a word: morning<br> Good morning
    8·2 answers
  • Protocols at which layer of the OSI model have the primary function of moving datagrams through an internetwork connected by rou
    7·1 answer
  • What is the difference between i++ and ++ii?
    6·1 answer
  • which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) short
    9·1 answer
  • How to edit slides into video.
    13·1 answer
  • Html is a markup language that lets you identify common sections of a web page
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!