1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
4 years ago
14

What should a safe username do?

Computers and Technology
2 answers:
hjlf4 years ago
5 0
It should keep your personal information private, so that people will not go about using it for the wrong things. 
Please mark me as brainliest. Thanks !!
Rina8888 [55]4 years ago
3 0
The answer is C. 

Because that's the only one that says that it will keep your info safe and not with other people or out in the open
You might be interested in
Special computers, called __________, keep databases of IP addresses and their corresponding names
vitfil [10]
Name servers.
-----------------------------------------------------------
4 0
3 years ago
My cell phone rear camera is dirty does anyone know how to clean it?
Vesna [10]
If you have glasses the liquid and cloth can be used to clean it. You spray the camera, then use the cloth to wipe it up. If you don't have them the dollar store should have some, or even places like Walmart and Maceys.
5 0
3 years ago
Read 2 more answers
How do you jumpstart a car in the middle of nowhere??? Explain using 2 paragraphs.
Julli [10]
Is there another car around? If not the best way would be to put the car in neutral, get the car moving, than pop the clutch (or slam into drive if it's not a manual) the key should be on to do this. This has the same effect as a starter just doesn't require a battery.<span />
7 0
3 years ago
Read 2 more answers
Given the macro definition and global declarations shown in the image below, provide answers to the following questions:
galben [10]

Answer:

A. 243

B. True

C. 0

Explanation:

Macro instruction is a line of coding used in computer programming. The line coding results in one or more coding in computer program and sets variable for using other statements. Macros allows to reuse code. Macro has two parts beginning and end. After the execution of statement of quiz4 x, 4 the macro x will contain 243. When the macro is invoked the statement will result in an error. When the macro codes are executed the edx will contain 0. Edx serve as a macro assembler.

4 0
3 years ago
Privacy laws in other countries are an important concern when performing cloud forensics and investigations. You've been assigne
Klio2033 [76]

Answer:

See the explanation for the answer.

Explanation:

Australian regulations makes extremely difficult for the enterprises to move organizations sensitive data to the cloud which is storing outside the Australian network. These are all managed by the Office of Australian Information Commissioner(OAIC) which provides oversight on the data privacy regulations designed to govern the dissemination of the sensitive information.

One rule they applied under this is The Australian National Privacy Act 1988 which tells how the organizations collect, use, secure, store the information. The National Privacy Principles in the Act tells how organizations should use the people's personal information. The NPP has a rule that An organization must take the responsibility to hold the information without misuse or modified by unauthorized access. They require enterprises to put security service level agreements with the cloud service providers that define audit rights, data location, access rights when there is cross border disclosure of information.

In later time they introduced a new principle called The Privacy Amendment Act 2012. This principle gives set of new rules along with the changes in the many rules in the previous act and also this is having a set of new principles those are called Australian Privacy Principles (APP).

In this there is principle for cross border disclosure of personal information which is APP8. This rule regulates the disclosure or transfer of personal information by an agency or company to a different location outside the country.

Before disclosure the information outside they have to take responsible steps that the company outside the Australia must not breach the APP 's.

3 0
3 years ago
Other questions:
  • Is anyone else experiencing the wording::nonifacation::glitch about the "5 hours ago" thingy to whenever you answer a question o
    7·2 answers
  • Questions 1 )When does a spring tide take place?
    14·2 answers
  • Fill in the blank
    13·2 answers
  • The component that allows you to make a paper-based copy of a body of text is the _____.
    12·1 answer
  • Ashley works for a company that helps hospitals hire new doctors. They have written a list of strategies that can be used to int
    12·1 answer
  • In which of these areas can software engineers specialize?
    10·1 answer
  • Which of the following statements is true for DMA: (only one correct answer) A. In DMA, Processor checks status until the operat
    9·1 answer
  • Raw materials have two basic types what are the 2?
    11·2 answers
  • A user generates printouts consisting of several pages of seemingly random characters every time he prints to a network printer.
    5·1 answer
  • What is the function of tab?<br>​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!