1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivenika [448]
4 years ago
7

Importance of being having data on hand​

Computers and Technology
1 answer:
jeka944 years ago
6 0

Answer:

Explanation:

Data is collected is to make the decisions that will positively impact the success of a company, improve its practices and increase revenue. It is also essential that the way in which data are collected, assembled and published respects Indigenous sensitivities, not least so as to ensure that Indigenous people understand the purposes for which the data is being collected and willingly provide accurate answers to data collectors.

Hope this helped you!

You might be interested in
Which of the following is not an example of technological progress? A: new scientific knowledge that has practical applications
kirill115 [55]
Why isn't there an option [B]? :p

Ah, nevermind. I believe the answer is [C], anyway. Simply building new roads and adding to existing infrastructures cannot really be counted as a "technological improvement". Nothing is technologically improving.
3 0
4 years ago
Read 2 more answers
Match each law with the corresponding descriptions. Wassenaar Arrangement HIPIAA PCI DSS FERPA GLBA SOX A. controls the way fina
3241004551 [841]

Answer:

A. controls the way financial institutions deal with private information of individuals.

Answer is: GLBA

B. Provides privacy for educational records.

Answer is:  FERPA

C. protects investors from fraudulent accounting activities.

Answer is: SOX

D. International agreement that controls the export of encryption technologies.

Answer is: Wassenaar Arrangement

E. Provides data privacy for safeguarding medical information.

Answer is: HIPAA

F. Provides safeguards for credit card transactions.

Answer is: PCI DSS

Explanation:

A. Gramm-Leach-Bliley Act (GLBA) is a federal law. This law deals with the financial institutions. These institutions provide financial services like loans. insurance etc and this law controls and deals with how these institutions handle and protect the confidential information of individuals i.e. their customers private data.

B. Family Educational Rights and Privacy Act (FERPA) is a federal law which deals with the privacy of academic records of students. Academic record include the student's transcripts, contact information, reports related to discipline, conduct and exam reports. These records can be viewed by the parents of the children and these records are protected by the institutions and they are not allowed to disclose or release this information to others.

C. Sarbanes-Oxley Act SOX is an act which protects from the fraudulent accounting activities by companies and the companies have to conform to the SOX. It also provides protection for financial records.

D. Wassenaar Arrangement is export control agreement for weapons and critical goods, equipment and technologies. It controls the spread and delivery of such equipment and technologies that can cause destruction of any kind thus considering the international and regional peace and security.

E. Health Insurance Portability and Accountability Act (HIPAA) is an act that deals with the provision of medical data and health information protection. This information can also be in electronic form. So many health care systems and applications which provides security such as by controlling access to the medical information of an individual and at the same time provides facilities and flexibility by adopting new technologies which has improved the patient and health care.

F. The Payment Card Industry Data Security Standard PCI DSS deals with the protection of credit, debit and cash card transactions. PCI DSS have some policies regarding the security. These policies ensure to improve the security of the card transactions and the goal is also to provide the card holder with the protection from the misuse of their sensitive data. So the companies are required to accept or process the data of the cardholder in a secure way. This will protect the card holder against data breaches.

8 0
4 years ago
How can you check an orthographic drawing to be sure there are no missing lines
user100 [1]
With an magnify glass
4 0
3 years ago
The process of adding a header to the data inherited from the layer above is called what option below
Tom [10]

Answer:

The correct answer to the following question will be "Encapsulation".

Explanation:

The wrapping of the data into a single unit or the method by which a header is applied to the data inherited from the above layer is termed as Encapsulation.

While relating to networking, encapsulation would be the method of storing and converting data through one protocol into another, so that the data can proceed over a network. A TCP/IP package contained under an ATM system, for example, is indeed a kind of encapsulation.

Therefore, Encapsulation is the right answer.

4 0
3 years ago
Deb needs to add borders on the cells and around the table she has inserted into her Word document.
slavikrds [6]

Answer:

Design tab

Explanation:

  1. Select the call or table that you will like to use
  2. Then select the <em>design tab</em>
  3. In the group <em>page background</em> select <em>Page Borders</em>
  4. There you will have multiple choses for where you want your border
  5. You can even customize your border by pressing <em>Custom Border </em>at the bottom of the list for <em>Page Borders</em>
4 0
3 years ago
Read 2 more answers
Other questions:
  • When a class declares an entire class as its friend, the friendship status is reciprocal. That is, each class's member functions
    14·1 answer
  • . Alex discovered a bunch of SATA drives in a box at the office and needs to check the contents. What can he do so that Windows
    13·1 answer
  • Are the advantages of a climate control in a vehicle
    10·2 answers
  • What is important for an internet user to know about https:// ?
    9·1 answer
  • A tool in Word that creates multiple copies of the same letter, envelope, or label and inserts personalized data is a(n) _____.
    12·1 answer
  • When you click the Decrease Font Size button, Excel assigns the next highest font size in the Font Size gallery.
    8·1 answer
  • Write a function in Java to implement the following logic:
    13·1 answer
  • Cryptography is the science of secret writing. Cryptography involves creating written or generated codes that allow information
    15·1 answer
  • Aisha designed a web site for her school FBLA club and tested it to see how well it would resize on different systems and device
    5·1 answer
  • Government entities may pressure upstream Internet service providers to _____. a. track and monitor the Internet activities of i
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!