1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks04 [339]
2 years ago
8

Privacy a. is an absolute value so corporate interests cannot be considered when it comes to employee privacy. b. is guaranteed

by Article 3, section 3, of the Constitution. c. must be respected if we are to function as complete, self-governing agents. d. is something that employees today care less about because of personal sharing on the internet.
Computers and Technology
1 answer:
zmey [24]2 years ago
8 0

Answer:

C. Must be respected if we are to function as complete, self-governing agents.

Explanation:

<em>Privacy</em> is the boundaries that are set up to protect us against unwanted intrusion or interference, and it forms the basis of our interaction with the world.

<em>Privacy laws</em> are set-up to protect individuals from unwanted and unapproved access to privacy by individuals, organizations, and government. This is greatly adhered to in many countries.

To some extent, privacy is considered to overlap with security, because, when private information such as social security number, bank card details, account names, and details, etc. are accessed inappropriately, the individual's security is greatly compromised.

Therefore, privacy must be greatly respected if we are to function as complete, self-governing agents.

You might be interested in
Your manager has asked you to write a program that displays the percentage of males and female in your class. The program should
Blababa [14]

<u>Explanation:</u>

The program using <em>python programming language </em>would be:

First, we write the Input prompt.

<u>Input  prompt for the user</u>

number_of_males_in_class = int (input ('Enter the number of males: '))

number_of_females_in_class = int(input('Enter the number of females: '))

Next, we write the Process algorithm.

<u>Process  algorithm</u>

total_number_of_students_in_class = number_of_females_in_class + number_of_males

_in_class

percentage_of_males_in_class = number_of_males_in_class / total_number_of_students

_in_class

percentage_of_females_in_class = number_of_females / total_number_of_students

Finally, the Output process

<u>Output process</u>

print('Total number of males in class =', format(percentage_of_males_in_class, '.0%'))

print('Total number of females =', format(percentage_of_females_in_class, '.0%'))

7 0
3 years ago
How many lines are on a standard sheet of typing paper?
kotegsom [21]
60 lines on the paper
3 0
3 years ago
_______ is the remote performance of medical exams, consultations, health monitoring and analysis using special medical equipmen
laila [671]

Answer:

eHealth.

Explanation:

eHealth or electronic health is a digital medical platform used to connect individuals to medical treatment they so need but can not receive due to certain barriers.

The eHealth platform uses modern day technology for consultation, examination of patient's health, prescription of medication etc. But it refers patients to trusted medical facilities when the situation is critical.

All these are done electronically through the internet and has eliminated the boundaries of geographical location.

8 0
3 years ago
pleeeease help!! I tried to turn on icloud photos to save storage and it’s been stuck at 1%. does anyone know why or how to fix
gtnhenbr [62]

Answer:

Explanation:

It just takes a very long time if you have too many videos or even very long ones. It took me 14 hours to download mine. You have to let it download though do not interrupt it! Very important!

3 0
3 years ago
Discussion Question 10: A bank in California has 13 branches spread throughout northern California , each with its own minicompu
GuDViN [60]

Answer:

The system that will be more prone to attack or vulnerability is the  bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.

Explanation:

Solution

If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable  to unauthorized persons or individuals.

The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.

With this example, the chances of vulnerability or attacks increases from the following :

  • Accounts payable could be disturbed by changing cash in payment false.
  • Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.
  • Transaction fraud like hacking, masquerading are very common in a networked system.
3 0
2 years ago
Other questions:
  • Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
    13·1 answer
  • When you first start your computer, which software will have to start first?
    5·2 answers
  • Jack is writing a paragraph for a school assignment. He proofreads his paper and notices that he used the word, "then" many time
    15·2 answers
  • How does technology improve convenience, but impact our privacy?
    8·1 answer
  • What kind of value should an employee possess when employees are expected to be responsible and fair?
    7·1 answer
  • Anti-lock braking systems can significantly.... a. impede your braking stability. B. improve your braking stability. C. improve
    5·1 answer
  • What is an accurate definition of a goal?
    15·2 answers
  • Write a program with a function that accepts a string as an argument and returns the number of uppercase, lowercase, vowel, cons
    14·1 answer
  • An online retailer has developed an algorithm to provide personalized recommendations to shoppers. Which form of IPR protects th
    7·1 answer
  • In Fantasy Football, participants compete against one another by choosing certain players from different NFL teams that they thi
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!