1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mamont248 [21]
3 years ago
8

Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis

it at least four well-known websites and examine their privacy policies. Write a report that rates each of the websites on the criteria you have developed.
Computers and Technology
1 answer:
dusya [7]3 years ago
3 0

Answer:

The features that required to protect the privacy should be:

  1. Protection of User name and Password
  2. Protection of Finger print and other bio metric information if collected from user.
  3. Protection of Personnel Information such as contact information, Identity information if collected.
  4. Protection of data shared such as pictures and videos.

Explanation:

Privacy protection is required to different websites that are involved in collection of different information from users such as user name, password, contact information, account information and messengers. These websites could be website of some bank, online mailing platforms, online shopping platform and social media platforms. These all are used to share and gather our personnel information for different purposes. To ensure the protection of user data they signed a document with users at the time of making account.

The above mentioned are the features that should be included in privacy protection of the website. As all mentioned features are personnel for every user and should be protected from hackers.

You might be interested in
Type the correct answer in the box. Spell all words correctly. Joseph is a digital media developer and has years of work experie
Damm [24]

It is better to develop soft skills. Irrespective of profession, soft skill is a common skill which is required to be present in everyone to move along with others and continue the work successfully. A person who is good at technical need soft skill to work in collaboration with others, manage team, solve problems, etc.

So there are separate soft skill training provided for various roles and years of experience. So, I suggest to have soft skill training and do additionally MBA degree.

5 0
4 years ago
Why are duplicate tuples not allowed in a relation?
velikii [3]

Answer:

Explanation:

Duplicate tuples are not allowed in a relation because the specifications of the constraints of the regional integrity are violated, especially the main constraint that states that there can be no identical values for the attributes of two tuples at any database relation state.

Also, duplicate tuples are not allowed in a relation due to the fact that they lead to redundancy of the data base which in turn, slowing down the speed of the database when data processing such as inserting, querying, updating, deleting, etc are being performed.

4 0
4 years ago
What is one difference between the Simple Gear Train with Same Size Gears and Simple Gear Train with Different Size Gears?
polet [3.4K]

Answer:

One difference between a Simple Gear train with Same Size Gears and Simple Gear Train with Different Size Gears is the that the number of rotations of both shafts in the Simple Gear Train with Same Size Gears is the same the number of rotations of both shafts in the simple Gear Train with Different Size Gears are different

Explanation:

A simple gear train is one in which each shaft has only one shaft, and the motion of one shaft in transmitted to the other when the gears are in contact

5 0
3 years ago
Which of the following is an example of an inline element? A. B. C. D.
____ [38]
what are the answers??
3 0
2 years ago
Can anyone give me nitrotype gold? Name username is lol3628 display name is iluvkitkats
Vsevolod [243]

Answer:

no

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • What type of Windows Server is the most likely server to be targeted by a computer hacker?
    13·2 answers
  • A directional antenna issues wireless signals along a(n) ____ direction.
    9·1 answer
  • 2. What are the pros and cons of Toyota structure?
    13·1 answer
  • The function below takes a single parameters: a list of numbers called num_list. Return a new list containing just the three lar
    5·1 answer
  • Universal Container sales reps can modify fields on an opportunity until it is closed. Only the sales operations team can modify
    13·1 answer
  • You csn access various sites on the www by using hyperlinks or by
    7·1 answer
  • Kiara is using her software's graphic formats to create a line graph. As she
    9·2 answers
  • Perform depth-first search on each of the following graphs; whenever there's a choice of vertices, pick the one that is alphabet
    8·1 answer
  • Tyra is peer conferencing about her project with a friend. Tyra's friend provided feedback that Tyra does not agree with. What s
    6·1 answer
  • Please Answer Quickly.<br> Match the item on the left with the reason that it is false on the right.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!