1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
4 years ago
9

When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an

example of (b) invisible information gathering (c) data spillage (a) secondary use (d) data mining
Computers and Technology
1 answer:
sasho [114]4 years ago
6 0

Answer: (b) invisible information gathering

Explanation:

Invisible information gathering is the process in which sensitive and personal information about any authorized is collected without their acknowledgement.Example-cookies etc

  • According to thew question example of invisible information gathering is depicted when links and IP address of the website visitor gets collected automatically without their knowledge.
  • Other options are incorrect because data spillage, data mining and secondary usage is not determined through secret collection of information without knowledge of authorized person.
  • Thus, the correct option is option(B)
You might be interested in
The term ____ refers to a series of storage devices, such as tapes, hard drives, and cds, that are networked together to provide
Setler [38]

Answer:

SAN

Please Mark Brainliest If This Helped!

5 0
2 years ago
If i had apple and microsoft both on my computer and they both fight what would i do
riadik2000 [5.3K]

Answer:

ok

Explanation:

5 0
3 years ago
Read 2 more answers
This assignment is about making a simple multi-page "online dating" site that processes HTML forms with PHP. Online dating has b
xxMikexx [17]

Answer:

THE FOLLOWING FILES ARE:

  1. nerdluv.php
  2. signup.php
  3. signup-submit.php
  4. matches.php
  5. macthes-submit.php
  6. common.php

Explanation

<em>The provided nerdluv.php has a header/footer and links to singup.php and matches.php. This file's contents are complete, but larger parts of it are repeated on other pages. The repeated parts should be turned into functions in common.php that are called by each page. The sign up link leads to singup.php and check matches to matches.php.</em>

<em>The signup.php page has a header logo, a form to create a new acount, and footer notes/images. You must write the HTML code for the form, the form should contain the labeled fields such as name, gender, age, personality tipe, favorite OS, seeking age, and sign up.</em>

<em>The signup-submit.php code should creat a line representing the new user's information and add it to the end of the file. The resulting page has the usual header and footer and text thanking the user. The text log in to see your matches links to matches.php.</em>

<em>Use functions, parameters/return, included files/code, loops, variables, etc, to avoid redundancy. If you have HTML or PHP code that is shared or redundant between multiple pages, place it into functions in common.php. You can include your common.php in your other pages.</em>

8 0
3 years ago
I recently made this so I won't mind if you look at it: https://scratch.mit.edu/projects/594493248
SVETLANKA909090 [29]

Answer:

Its really good just make it so you can reload faster because the zombies keep catching up :)

Explanation:

8 0
3 years ago
Select the correct images. From her stack of photographs, Alice has to pick images that a photographer shot using the sports mod
OLEGan [10]

Answer: i think its the horse the boy hopefully i helped

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is NOT contained on the Slide Show toolbar?
    13·1 answer
  • Intranets are typically set up behind a firewall. <br> a. True <br> b. False
    15·1 answer
  • Pros of mobile devices on young people during their free time
    5·1 answer
  • 5.11 Of these two types of programs:a. I/O-boundb. CPU-boundwhich is more likely to have voluntary context switches, and which i
    9·1 answer
  • Which shape denotes a process to be carried out in a flowchart?
    7·2 answers
  • Which cell address indicates the intersection of the first row and the first column in worksheet?
    12·2 answers
  • Somebody supplied me with a file that was edited on a Windows machine. The file contains carriage returns in addition to the new
    9·1 answer
  • Which among the following shortcut key is used to check spelling​
    12·2 answers
  • Major characteristics of the bus in computer architecture​
    8·1 answer
  • A specific packet journey, from your computer to a remote server, end-to-end across multiple networks, has the following link ba
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!