1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mamont248 [21]
3 years ago
8

Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis

it at least four well-known websites and examine their privacy policies. Write a report that rates each of the websites on the criteria you have developed.
Computers and Technology
1 answer:
dusya [7]3 years ago
3 0

Answer:

The features that required to protect the privacy should be:

  1. Protection of User name and Password
  2. Protection of Finger print and other bio metric information if collected from user.
  3. Protection of Personnel Information such as contact information, Identity information if collected.
  4. Protection of data shared such as pictures and videos.

Explanation:

Privacy protection is required to different websites that are involved in collection of different information from users such as user name, password, contact information, account information and messengers. These websites could be website of some bank, online mailing platforms, online shopping platform and social media platforms. These all are used to share and gather our personnel information for different purposes. To ensure the protection of user data they signed a document with users at the time of making account.

The above mentioned are the features that should be included in privacy protection of the website. As all mentioned features are personnel for every user and should be protected from hackers.

You might be interested in
An ellipse (three dots) following a menu item indicates that
Mariulka [41]

Answer:

Correct answer is

clicking on item will display a dailogbox/ more options

Explanation:

In web site menus have limited space.To add all items menus are grouped in categories and only category names are shown while there subsets are displayed in a drop down list upon hovering on them.

Some time designer user three dot indication which indicates there are more options available in a hidden side bar or dialog menu which opens upon clicking the ellipse.

3 0
3 years ago
Read 2 more answers
Select the correct answer. What is the final step of the object-oriented design process?
Vikentia [17]
D. Writing the methods of the classes
6 0
2 years ago
What is biological diversity?​
Olenka [21]

Answer:

The term biodiversity (from “biological diversity”) refers to the variety of life on Earth at all its levels, from genes to ecosystems, and can encompass the evolutionary, ecological, and cultural processes that sustain life.

Explanation:

5 0
3 years ago
Your manager has asked you to shift usage and consumption of technology resources from a local environment managed by in-house I
Alexus [3.1K]

Answer:

B. Cloud computing

Explanation:

Cloud computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

4 0
3 years ago
5. All sites are required to have the following reference materials available for use at VITA/TCE sites in paper or electronic f
raketka [301]

Answer:

Publication 5140.

Explanation:

The acronym VITA stands for Volunteer Income Tax Assistance and TCE stands for Tax Counseling for the Elderly. VITA/TCE is a certification gotten from the Internal Revenue Service in which the holders of such certification are trained on how to help people that have disabilities or that their incomes earners that are low. These volunteers help these set of people to prepare for their tax return.

In order to make the volunteers to be able to perform their work with high accuracy, the Department of Treasury, Internal Revenue Service gave out some aids for Quality Site. One of the aids which is the one contains information about the new security requirements at sites is given in the Publication 5140.

6 0
3 years ago
Other questions:
  • If we have an economy that operates with a minimum of government interference, why are there so many laws on the books about emp
    7·2 answers
  • Which type of cause and effect organizer would be best for alisha to understand how crude oil becomes gasoline?
    6·2 answers
  • What is the purpose of an internet protocol address (ip address)?
    5·1 answer
  • If totalMonths has a string value of "13", what does the code that follows display?var years = parseInt ( totalMonths / 12 );var
    6·1 answer
  • Why is outfitting a workspace with video games in technology development company considered a strategic use of money
    8·2 answers
  • How to get the home button on your screen?
    13·1 answer
  • what program searches the Internet for specified keywords and returns a list of the pages where the keywords were found
    6·1 answer
  • Judy forgot where she saved a certain file on her computer. Therefore, she searches for all files with a .jpg file extension. Wh
    7·2 answers
  • How to follow accounts on brainy
    11·1 answer
  • A _______ is a group of elements that you want to style in a particular way.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!