1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna35 [415]
3 years ago
13

Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data

in aggregate?
Computers and Technology
1 answer:
iren [92.7K]3 years ago
4 0

Answer:

De-identification or data anonymization.

Explanation:

Privacy rights are fundamental right of individuals to privatise all personal information, when creating an account.

The de-identification and data anonymization technology is provided by the organisation to user, to prevent their information to be viewed by others. It commonly used in cloud computing, communication, internet, multimedia etc. Reidentification is the reversing of the de-identification effect on personal data.

You might be interested in
One of the main operations associated with the dictionary ADT is:
Digiron [165]
ITS B my friends and teacher helped
4 0
2 years ago
"______" is a wireless local network that uses high frequency radio signals to transmit an Internet signal from a wireless route
Hitman42 [59]

Answer:

Modem possibly

6 0
3 years ago
85 points!!!!!!!!!!!!!!! is creating a résumé. Which parts of her résumé has she done correctly?
Ket [755]

Answer:

Decorative font, because having a fancy font on a resume is not going to be looked at

5 0
2 years ago
Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a mem
Svetach [21]

Answer:

log off of his account and log back in

Explanation:

The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.

4 0
3 years ago
There is the proof that you were asking for
VashaNatasha [74]

Answer:

I think you have gone mad BTW.....

3 0
2 years ago
Read 2 more answers
Other questions:
  • Name at least two types of career options that are available for someone with strong typing skills?
    10·2 answers
  • Which of the following is the largest unit of information?
    15·2 answers
  • Design and implement a program to display each directory entry information (files and directories) of current directory, and wit
    9·1 answer
  • relational integrity constraints are rules that enforce basic and fundamental information-based constraints. True or False
    9·1 answer
  • What should you do if you forget your root password for MySQL?
    13·1 answer
  • ________ are the primary means of authentication for a user's computer and other networks and servers to which the user may have
    10·1 answer
  • The best technique to read​
    8·1 answer
  • What is the ghosted text or picture behind the content on the page?​
    6·1 answer
  • Clasifica los documentos comerciales en activo, pasivo o patrimonial para cada operacion:
    14·1 answer
  • Array bounds checking should be directly coded into a system rather than assumed.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!