1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
3 years ago
8

An investigator obtains consent and HIPAA authorization from subjects to review their medical records and HIV status. He plans t

o go back to the medical record, so the HIV status information is stored along with subject identifiers in a database that he keeps on his laptop computer. His laptop is stolen. This incident constitutes:
a. A FERPA violation
b. A HIPAA violation
c. An invasion of privacy
d. A breach of confidentiality
Computers and Technology
1 answer:
sertanlavr [38]3 years ago
8 0

Answer:  d)A breach of confidentiality

Explanation: Breach of confidentiality is the situation in which the confidential information kept by an authorized individual get leaked to public or any third party without the acknowledgement of the authorized party.The stolen laptop is disclosing the confidential information to third party without the consent of investigator.

Other options are incorrect because FERPA violation is the violation of the family education  rights and privacy act ,HIPPA violation is breaking rule of health insurance portability and accountability act and privacy invasion refers to intrusion in any individual's private or personal life.Thus, the correct option is option(d)

You might be interested in
A _____ is one in which the size of the web page and the size of its elements are set regardless of the screen resolution..
mixas84 [53]

Answer: Fixed layout

Explanation:

Fixed layout  is the arrangement of any website page or webpage that is featured with fixed size on any screen resolution .Fixed layout displays all the components and tools of the page with a fixed percentage.

  • The width or percentage cannot be changed or altered as it is fixed.The user experiences same width of the page and elements in any computing resolution.

7 0
3 years ago
domain controllers store local user accounts within a sam database and domain user accounts within active directory. true or fal
Natalka [10]

Answer:

True

Explanation:

The domain controller is a server that responds within windows server domains to request for security authentication. It enforces security for windows and they are useful for storing the account information of users, that is local users within a Security Account Manager. Therefore the answer to this question is true.

Thank you!

5 0
2 years ago
Write a program that asks the user to enter the amount that he or she has budgeted for a month. A loop should then prompt the us
Dominik [7]

Answer:

import java.util.*;

public class Main {

public static void main(String[] args)

{

Scanner scan = new Scanner();

double budget=0, num=0, total=0;

System.out.println("Your budget for the month? ");

budget=scan.nextDouble();

System.out.println("enter all expense, and after that type -9999 to quit: ");

while(num != -9999)

{

total+=num;

num=scan.nextDouble();

}

if(total<=budget)

{

System.out.println("under budget by ");

System.out.println(budget-total);

}

else

{

System.out.println("over budget by ");

System.out.println(total-budget);

}

}

}

Explanation:

  • Take the budget as an input from user and store it to the budget variable.
  • Loop until user has entered all his expenses and keep on adding them to the total variable.
  • Check If the total is less than or equal to budget or otherwise, and then print the relevant message accordingly.
4 0
3 years ago
Can you list the answers in order
viva [34]

whats the question?????????????????????

5 0
2 years ago
What are web protocols.
RoseWind [281]

Answer:

Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.

7 0
2 years ago
Read 2 more answers
Other questions:
  • Is it possible to do calculations with text data in Ms Excel
    9·2 answers
  • Why has unicode become the standard way of converting binary to text
    7·1 answer
  • Software can be distributed on the web. <br> a.true <br> b.false
    12·1 answer
  • Spreadshet formula to add totals​
    12·1 answer
  • A video streaming website uses 32 bit integers to count the number of times each video is played. In anticipation of some videos
    14·2 answers
  • Write any two use of computer in school​
    15·1 answer
  • Refer to the following code segment. You may assume that array arr1 contains elements arr1[0],arr[1],...,arr[N-1], where N = arr
    8·1 answer
  • What are two example of ways an electronic record may be distributed to others?
    11·1 answer
  • Write SQL statements for the following: 1. 2. 3. Change the column Z of a table XYZ to now acceptdefault value 9999 Delete a tab
    8·1 answer
  • Machines may aid in making work easier over a longer distance. true or false.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!