1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
4 years ago
5

The Online Privacy Alliance: is a safe harbor program established by the U.S. government. protects user privacy during interacti

ons with websites. has established technical guidelines for ensuring privacy. is a government agency regulating the use of customer information. encourages self-regulation to develop a set of privacy guidelines for its members.
Computers and Technology
1 answer:
MakcuM [25]4 years ago
6 0

Answer:

encourages ... for its members. The last option.

Explanation:

The online Privacy Alliance is undoubtedly not a package by the US administration. It is a collaboration of 81 e-commerce associations and the businesses. And it does not defend user confidentiality during interactions with the websites, and neither has recognized any technical strategies for privacy determination.  And it is also not a government agency. Though, it certainly inspires the self-regulation to advance a set of privacy guidelines for its members, Hence, the correct option is certainly the one that is mentioned in the answer section, and as explained above.

You might be interested in
Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing the
zvonat [6]

Answer:

wireless LAN

Explanation:

An extranet is a network area where people or corporate partners external to the company access data. An intranet simply describes the network area that is normally accessed only by internal personnel. The wired LAN is affected by BYODs (bring your own devices) when the devices attach to the wired network. A college wireless LAN is most likely used by the tablet and smartphone. A wireless WAN would more likely be used by college students to access their cell provider network.

3 0
4 years ago
Write the code to call a function named send_variable and that expects a single int parameter. Suppose a variable called x refer
NemiM [27]

Answer:

<em>#include <iostream></em>

<em>using namespace std;</em>

<em>//function definition</em>

<em>void send_variable(int num){</em>

<em>    cout<<"The Number is "<<num<<endl;</em>

<em>}</em>

<em>// main function begins here</em>

<em>int main()</em>

<em>{</em>

<em>    int x =15; //declares an it variable and assigns 15</em>

<em>    // Calls the function send_variable</em>

<em>    send_variable(x);</em>

<em>    return 0;</em>

<em>}</em>

Explanation:

Using C++ programming language we created the function called send_variable and in the main function we call this function which only displays the value of an int variable passed unto it.

6 0
3 years ago
Daisy, an HR executive at Matrix-Solutions, was given the responsibility to conduct induction training for the newly hired emplo
sasho [114]

Answer:

The answer is Presentation Software.

Explanation:

The application that best suits her purpose is a Presentation Software. Such as: powerpoint, google presentations, keynote,  OpenOffice Impress, Media Shout, Harvard Graphics, Adobe Persuasion.

These are excellent tools for Daisy's purpose.

8 0
3 years ago
​_____ refers to​ internet-based platforms that allow users to create their own content and share it with others who access thes
liberstina [14]
This would be considered a social media platform due to it allowing people to share content.<span />
6 0
3 years ago
Write a python program to accept a number and check whether it is divisible by 4 or not​
Alenkasestr [34]

Answer:

number = int(input("Enter number: "))

if (number % 4):

 print("{} is not divisible by 4".format(number))

else:

 print("{} is divisible by 4".format(number))

Explanation:

If the %4 operation returns a non-zero number, there is a remainder and thus the number is not divisable by 4.

5 0
3 years ago
Other questions:
  • ____ programs are software programs that are distributed on the honor system.
    7·2 answers
  • A derived character that is shared by all members of a clade is called a ______________ of that clade.
    6·1 answer
  • Discuss some design considerations that you should keep in mind when you want to design a professional-looking flyer or newslett
    5·2 answers
  • When the hyper-v role is added to a windows server 2012 r2 server, what is loaded first during boot?
    6·1 answer
  • I play Among us :) hbu
    7·2 answers
  • A virus enters a computer or network _____.
    13·1 answer
  • How can utility poles be eliminated as roadside hazards
    9·1 answer
  • Write a function in the cell below that iterates through the words in file_contents, removes punctuation, and counts the frequen
    6·1 answer
  • Expliquer les règles à respecter quand on fait une recherche sur internet.
    7·1 answer
  • THE DIFFERENCE BETWEEN COPY AND PASTE AND CUT AND PASTE IS: *
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!