1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldenfox [79]
3 years ago
12

Websites often request information about you. You have a choice as to whether or not you provide this to them. What aspect of PA

PA is being implemented?
a. Privacy
b. Accuracy
c. Property
d. Accessibility
e. Reliability
Computers and Technology
1 answer:
Alika [10]3 years ago
4 0

Answer:

Option A.

Explanation:

You might be interested in
Which key do programmers use to end running programs?
Aleksandr [31]
<span>Pause/Break   i would say</span>
3 0
3 years ago
Read 2 more answers
The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes:
GuDViN [60]

Answer:

C. Post-incident activity.

Explanation:

An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.

An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.

7 0
3 years ago
(e) The vending machine stores the quantity of items available in a database table called ITEMS
zimovet [89]

Answer:

a1,a2,62,

please mark brainliest

Explanation:

8 0
2 years ago
Tim has an old server computer that his company uses as a backup. One of the hard drives has gone bad and needs to be replaced.
dimaraw [331]

Answer:

SCSI.

Explanation:

It is a set of ANSI-developed simultaneous interface requirements for connecting scanners, drives, printers, and many other devices to systems.

Although when Tim has such an outdated network system which is used as a backup by his corporation. Then hard drive may have gone wrong and required replacement. The connector used by the hard disk drive is not something he has ever seen before, but he upload photos of that on the community board of the organization to aid determine what kind of hard disk drive they will also have to order.

So, according to the following scenario he required SCSI cable.

4 0
3 years ago
Select the correct answer from each drop-down menu. What is a distribution list and how is it selected?
Soloha48 [4]
Blank 1 is email, and blank 2 is contacts list
6 0
2 years ago
Other questions:
  • List three types of cardinalities for relationships within a relational database.
    9·1 answer
  • The Modified Greiss chemical test is used to detect the presence of what chemicals that indicate muzzle to target distance?
    11·1 answer
  • The ____ cell on the worksheet is the one into which you can enter data.â
    15·2 answers
  • Write a Python function called validateCreditCard that takes 8-digit credit card number as the input parameter (string value) an
    8·1 answer
  • Define a romanNumberToInt function that converts a RomanNumber value, which is a list of Roman digits, into an integer. Hints: -
    7·1 answer
  • How is marketing related to the other functions of a business
    14·1 answer
  • You are installing several servers that will be used as web servers to reach customers over the Internet. Where should you place
    14·1 answer
  • Which of the examples is part of client-side code?
    12·1 answer
  • Can i have help for a ggogle class room
    14·1 answer
  • I need help with humans need not apply for codeing
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!