Answer: A privacy data breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority. A privacy breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority.
Explanation:
Examples of a data breach might include:
Loss or theft of hard copy notes, USB drives, computers or mobile devices. an unauthorized person gaining access to your laptop, email account or computer network. sending an email with personal data to the wrong person.
Answer:
<u>Scalable database</u>
Explanation:
Good examples of a scalable database include; NoSQL database, MySQL, Microsoft SQL.
<em>Remember</em>, these databases are called scalable databases because they support memory expansion without a measurable performance decrease.
For example, if the management of a hotel notices that its 1 terabyte computer used to store its security videos is no longer adequate to meet the hotel's expansion, then decide to buy a newer server that can be integrated into the current system. We can say they just applied the concept of scalable databases.
Answer:
IEEE 1394 supports more devices on a single bus
Explanation:
What this means is that IEEE 1394 provides a single plug-and-socket connection on which up to 63 devices can be attached with data transfer speeds up to 400 Mbps (megabit s per second). The standard describes a serial bus( A shared channel that transmits data one bit after the other over a single wire or fiber) or pathway between one or more peripheral devices and your computer's microprocessor .
I believe the first three. 1 and 2 are safety precautions. 3 can help someone remember what the file is. For number 4, the computer will typically do that on its own but not as the exact file name. Usually by right clicking and looking under info it will show the size of the file.