1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mamont248 [21]
3 years ago
8

Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis

it at least four well-known websites and examine their privacy policies. Write a report that rates each of the websites on the criteria you have developed.
Computers and Technology
1 answer:
dusya [7]3 years ago
3 0

Answer:

The features that required to protect the privacy should be:

  1. Protection of User name and Password
  2. Protection of Finger print and other bio metric information if collected from user.
  3. Protection of Personnel Information such as contact information, Identity information if collected.
  4. Protection of data shared such as pictures and videos.

Explanation:

Privacy protection is required to different websites that are involved in collection of different information from users such as user name, password, contact information, account information and messengers. These websites could be website of some bank, online mailing platforms, online shopping platform and social media platforms. These all are used to share and gather our personnel information for different purposes. To ensure the protection of user data they signed a document with users at the time of making account.

The above mentioned are the features that should be included in privacy protection of the website. As all mentioned features are personnel for every user and should be protected from hackers.

You might be interested in
Assume that name and age have been declared suitably for storing names (like "Abdullah", "Alexandra" and "Zoe") and ages respect
Irina18 [472]

Answer:

import java.util.Scanner;

public class num2 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter Name");

       String name = in.next();

       System.out.println("Enter Age");

       int age = in.nextInt();

       System.out.println("The age of "+name +" is "+age);

   }

}

Explanation:

Java programming language is used to write the code.

The scanner class is used to prompt and receive values for name and age which are stored in the appropriate variables.

The key idea here is using string concatenation in the output statement in order to print the desired output

3 0
4 years ago
someone please tell me if you watch drag race (rupauls drag race) I need someone to talk to about it ​
lys-0071 [83]
I’m gonna watch it soon
3 0
3 years ago
Which features should a study schedule include? Check all that apply.
Ivenika [448]

Answer: time of day, duration, due dates

Explanation: I am awsome

7 0
3 years ago
Read 2 more answers
Q1. Information systems that monitor the elementary activities and transactions of the organizations are: I a. Management-level
VashaNatasha [74]

Answer:

B. Operational-level systems monitor the elementary activities and transactions of the organization.

6 0
2 years ago
____ computers are used by large businesses, government agencies, and in science and education to provide centralized storage an
Charra [1.4K]

The answer to this question is the Mainframe Computer. Mainframe computers are used by large businesses, and government agencies because this computer can store large data and information. Mainframe basically known as a large cabinet because of its size and the frame stores the Central processing unit of the computer.  

3 0
4 years ago
Other questions:
  • Which of the following statements is true?a. Old paper documents, which were previously only available offline, are increasingly
    10·1 answer
  • When hundreds, thousands, or even hundreds of thousands of zombie computers are gathered into a logical computer network under t
    6·2 answers
  • When a programmer creates an abstract data type, he or she can decide what values are acceptable for the data type, as well as w
    12·1 answer
  • Long-tail keywords are:
    9·1 answer
  • Write a script that will read from a file x and y data points in thefollowing format:
    9·1 answer
  • When a person devises the idea for the venture, develops a business plan, uses savings or loans to acquire other resources and a
    9·1 answer
  • Which camera required the photographer to project the image on paper
    9·2 answers
  • Que segnifica mmmju?​
    15·1 answer
  • What is the hack of the cookie clicker
    11·1 answer
  • If you are inviting more than one person to a meeting, you can use a(n) _____ to separate the email addresses.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!