1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
4 years ago
10

Few people will care if you use their image in a photograph without obtaining their consent. True False

Computers and Technology
1 answer:
Mila [183]4 years ago
3 0
That is False because most people do not want their face appearing all around the internet with out them knowing what they look like or what they are doing. I'm also pretty sure that using someone else's picture<span> as yours without their consent </span>is illegal <span>unless you are given rights to </span>use<span> it.</span>
You might be interested in
Which type of photographer documents plants and weather in their natural habitat?
mario62 [17]
B, plants and weather are part pf nature.
7 0
2 years ago
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
2 years ago
A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.
kumpel [21]
The email should be lighter but they're variables such as the word processing program. Not sure if this answered your question.
6 0
4 years ago
Read 2 more answers
What is a credit limit? athe required payment to your credit card company. bthe amount of interest you are charged each month. c
Gnom [1K]
I believe the correct answer from the choices listed above is option C. A credit limit is the maximum amount you can charge each billing cycle.  <span>The </span>credit limit<span> on your credit card is the maximum balance your credit card issuer allows. Hope this answers the question.</span>
4 0
4 years ago
What is a technology?​
Leokris [45]

Answer:

The definition of technology is science or knowledge put into practical use to solve problems or invent useful tools

                                                    OR

Technology is the sum of techniques, skills, methods, and processes used in the production of goods or services or in the accomplishment of objectives, such as scientific investigation

7 0
3 years ago
Other questions:
  • You have opened the properties dialog box for an installed printer on your computer system. on what tab will you find informatio
    8·1 answer
  • Which of the following phrases describes top-down processing
    8·1 answer
  • O que é sistema distribuido?
    8·1 answer
  • "The study of how changes in the input parameters of a linear programming problem affect the optimal solution is known as
    8·1 answer
  • Importance of availability of mobile devices content that is of interest for users.
    12·1 answer
  • The ____ option must be used when running a program in order to see the results of assert statements.
    7·1 answer
  • Which XXX and YYY correctly output the smallest values? Vector user Vals contains integers (which may be positive or negative).
    15·1 answer
  • In half-wave rectification process, Vi=
    8·1 answer
  • Best company who provides the best ISP (internet service provider)?
    13·1 answer
  • I'll give u 16 points answer thisss
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!