1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
15

A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.

Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by:
Both the magnitude (or severity) and the probability (or likelihood) of harm. T/F
Computers and Technology
1 answer:
Brilliant_brown [7]3 years ago
7 0

Answer:

True.

Explanation:

An investigator would like to do an internet-based college student survey to gather data regarding their behavior as well as drug use. Even so, specific identifications are still not gathered and IP addresses might be available in the set of data. Damage threat must be assessed both by the magnitude (or severity) and the likelihood (or likelihood) of the hurt.

You might be interested in
What is the oldest malware victor
arsen [322]

Answer:

The oldest malware vector was emails.

Explanation:

Websites were not widespread early on into the internet, however it was very easy to have a virus that uses an email contact list, where it can send itself to other email addresses and spread.

7 0
3 years ago
Question # 4
arlik [135]

Answer:

Explanatio Morse code

4 0
3 years ago
If you receive an email message you suspect is spam, what should you do?
Alla [95]

Answer:

A.  delete the message without opening it.

Explanation:

Never open emails you don't know who sent it, it could be a hacker trying to get your personal/financial information.

6 0
3 years ago
What is the purpose of using a good e-mail technique?. Demonstrate your ability to write good e-mails b. Completely describe you
densk [106]
B. Completely describe your entire thought process
3 0
3 years ago
The Internet Protocol Suite consists of the Internet Protocol and _____. a. Transmission Control Protocol b. File Transfer Proto
Lesechka [4]

The Internet Protocol Suite consists of the Internet Protocol and Transmission Control Protocol. Then the correct option is A.

<h3>What are Internet Protocol and Transmission Control Protocol?</h3>

Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of communication protocols that are used to link network devices on the internet.

In a personal computer network, TCP/IP is often used as a wireless signal.

The IP suite's two major protocols have distinct roles. TCP specifies how apps might establish channels across a network.

More about the Internet Protocol and Transmission Control Protocol link is given below.

brainly.com/question/20813972

#SPJ1

6 0
2 years ago
Read 2 more answers
Other questions:
  • Use a spreadsheet to solve this business problem. The owners of an electronics store want to find which of their products makes
    12·1 answer
  • Fill in the blank. Do not abbreviate.
    6·1 answer
  • The variable grade can have any real number value from 0 to 100. Ask the user to enter a grade in numerical form. Write an if-el
    9·1 answer
  • How many computers/laptop's suported windows 10 pro with a game in vr?
    9·2 answers
  • How much will your assignment be docked if you turn it in late?
    7·2 answers
  • 6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
    11·1 answer
  • What can you use on Code.org's Web Lab to find and fix problems when you are writing code for your website?
    13·1 answer
  • Write a function check_palindrome that takes a string as an input and within that function determines whether the input string i
    12·1 answer
  • What is the difference between EPROM and EEPROM, explain why​
    11·1 answer
  • Examine the following output:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!