1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavlova-9 [17]
3 years ago
11

What does the Children's Online Privacy Protection Act do?

Computers and Technology
2 answers:
Tcecarenko [31]3 years ago
8 0

B ( It limits the data that children under 13 can access). is WRONG for plato users

the only other reasonable answer would be D. It limits the data that websites aimed at children under 13 can collect.

idk tho.

Novosadov [1.4K]3 years ago
7 0

Children under the age of 13 have extra privacy settings on their devices. This allows parents to monitor who and what a child is doing/talking to by restricting the access to certain apps/sites

You might be interested in
What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?
jeka94

Answer:

it would be amhv i think i hope it answered u'er question

Explanation:

8 0
4 years ago
What are two critical properties for a cryptographic hash function?
AleksandrR [38]

Answer:

The ideal cryptographic hash function has four properties: it is quick to compute the hash value for any given message. it is infeasible to generate a message from its hash value. it is infeasible to modify a message without changing the hash value.

3 0
3 years ago
Brianna is taking a backpacking trip in the wilderness and wants to back up the photos from her camera. Which type of storage de
Katen [24]

Answer:

<u><em>C</em></u>

Explanation:

Flash drives usually have an input (E.G. one of those android charger connectors), so just plug that into your camera, and load the flash drive with the photos. Then go home and plug the USB on the flash drive into your PC. If there isn't already, a folder will be made in your "Pictures" folder on your PC, to which you can open the folder, and then your photos should be there. From there you can open them, print them, etc.

Hope this helped, and sorry if I didn't answer in time.

6 0
3 years ago
What occurs when a system produces incorrect, inconsistent, or duplicate data?.
kozerog [31]

Answer: Data integrity issues

Explanation:

8 0
3 years ago
Which top-level domain can be used by anyone, regardless of their affiliation?
Firdavs [7]

Answer:

C. org

Explanation:

org is an open domain so anyone is allowed to register a .org domain

7 0
3 years ago
Other questions:
  • Based on the relational model, create the database metadata as part the physical designphase.b)from the metadata, write the sql
    10·1 answer
  • The information gathering technique that enables the analyst to collect facts and opinions from a wide range of geographically d
    11·1 answer
  • "______" is a wireless local network that uses high frequency radio signals to transmit an Internet signal from a wireless route
    9·1 answer
  • Why decomposition will be used in creating the algorithm for a game
    15·1 answer
  • You find a list of numbers on the kitchen counter, but you aren’t sure what the numbers represent. This is an example of:
    11·2 answers
  • Application servers are usually grouped into two types: page-based and _____ systems.
    6·1 answer
  • Write a function checkPalindrome that accepts a single argument, a string. The function should return true (Boolean) if the stri
    15·1 answer
  • The auto fill feature of excel only allows the user to fill cells with a series using the existing formatting options of the cel
    10·1 answer
  • Determine the lines that refer to specialty accommodation.
    5·1 answer
  • What is ICT?Write down the uses of ICT​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!