1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddik [55]
4 years ago
7

Online companies typically have a(n) _________ on their websites that clearly states what information is collected from users an

d what is done with that information.
Computers and Technology
1 answer:
Goshia [24]4 years ago
5 0

Answer:

Privacy Policy

Explanation:

A privacy policy is a written a document which  tells visitors to company's website what information will be collected and what the information will be used for. Simply put, it is a short statement of what you are doing to observe visitors to your website through use of cookies and other third parties like google ads.

You might be interested in
Has replaced the need for landline telephones in many instance​
Vladimir79 [104]

Explanation:

million landlines. During this same time the number of mobile phone lines that have been subscribed to has ...

Characteristics

7 0
3 years ago
What is malware? What are some signs that malware may be impacting the performance of your computer? How can you avoid malware?
Anni [7]

Answer:

Malware is a type of software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. Malware can be spread through email attachments, online advertisements, websites, and other methods.

Some signs that malware may be impacting the performance of your computer include:

  • Your computer is running more slowly than usual
  • Your computer crashes frequently
  • Your computer has pop-up ads or other unwanted behavior
  • Your default homepage or search engine has changed without your permission
  • You see new icons or programs on your desktop that you didn't install

To avoid malware, you should be cautious when browsing the internet and avoid visiting suspicious websites. You should also avoid opening email attachments from unknown senders, and be wary of online advertisements. You can also protect your computer by using antivirus software and keeping it up to date.

3 0
1 year ago
I just downloaded this song and if any one wants to listen to it then go ahead and do that. It’s called Trap Music 2018 âa bass
xz_007 [3.2K]

Answer:

ok

Explanation:

4 0
3 years ago
Read 2 more answers
A linear gradient can be positioned from left to right, top to bottom, or on any angle?
Harman [31]

from left to right because it is used more in expressions

3 0
3 years ago
Which of the following technologies uses the results of a scientific discovery?
belka [17]
D. All of these
Reason being, they wouldn't have been made if something hasn't been discovered about them.

4 0
3 years ago
Read 2 more answers
Other questions:
  • A way to have cells in your spreadsheet change formats based on the value of the cells is called ________.
    8·1 answer
  • A search engine that crawls uses
    7·1 answer
  • You manage an NLB cluster composed of three servers: Server1, Server2 and Server3. Your maintenance schedule indicates that Serv
    15·1 answer
  • Bill downloaded an antivirus software from the Internet. Under the Uniform Commercial Code (UCC), the software is a: Select one:
    15·1 answer
  • Many software makers provide free downloadable updates, sometimes called a(n) ______ to users who have registered and/or activat
    5·1 answer
  • Suppose cell C5 contains the formula =B$6+C1.
    6·1 answer
  • How can the system administrator give the executive assistant the ability to view, edit, and transfer ownership of all records,
    6·1 answer
  • If you were a hackathon team manager, how could you best address the conflict created by having more volunteers than open roles
    6·1 answer
  • Explain with examples the roles of system software and application software?<br>​
    6·1 answer
  • You are the security analyst for your organization and have discovered evidence that someone is attempting to brute-force the ro
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!