1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren [92.7K]
4 years ago
12

While many myths are harmless, why can myths themselves be dangerous?

Computers and Technology
1 answer:
blondinia [14]4 years ago
7 0

Answer:b

Explanation:

You might be interested in
What is print media?
swat32
Print Media is a part of the ATL (Above The Line) promotions adopted by an organization. It is the physically printed information on a piece of paper. There are several tools used in Print Media and they are as follows:

Newspaper
Magazine
Journals
Newsletters
Flyers
Brochures/Pamphlets
Leaflets
Posters
8 0
4 years ago
Select the correct answer.
Naddika [18.5K]

Answer:

E

Explanation:

4 0
3 years ago
What should you do if an online friend asked to meet you after school? <br>ᵖˡˢˢˢˢ...​
soldier1979 [14.2K]

Answer:

I'm going to agree if they had some decision when we meet to each other because I want to meet them in personal.

Explanation:

That's my own opinion

8 0
3 years ago
Read 2 more answers
Can someone help me with these two
Digiron [165]

upper question:

false

lower question:

25

26

-10

7 0
3 years ago
Match each law with the corresponding descriptions. Wassenaar Arrangement HIPIAA PCI DSS FERPA GLBA SOX A. controls the way fina
3241004551 [841]

Answer:

A. controls the way financial institutions deal with private information of individuals.

Answer is: GLBA

B. Provides privacy for educational records.

Answer is:  FERPA

C. protects investors from fraudulent accounting activities.

Answer is: SOX

D. International agreement that controls the export of encryption technologies.

Answer is: Wassenaar Arrangement

E. Provides data privacy for safeguarding medical information.

Answer is: HIPAA

F. Provides safeguards for credit card transactions.

Answer is: PCI DSS

Explanation:

A. Gramm-Leach-Bliley Act (GLBA) is a federal law. This law deals with the financial institutions. These institutions provide financial services like loans. insurance etc and this law controls and deals with how these institutions handle and protect the confidential information of individuals i.e. their customers private data.

B. Family Educational Rights and Privacy Act (FERPA) is a federal law which deals with the privacy of academic records of students. Academic record include the student's transcripts, contact information, reports related to discipline, conduct and exam reports. These records can be viewed by the parents of the children and these records are protected by the institutions and they are not allowed to disclose or release this information to others.

C. Sarbanes-Oxley Act SOX is an act which protects from the fraudulent accounting activities by companies and the companies have to conform to the SOX. It also provides protection for financial records.

D. Wassenaar Arrangement is export control agreement for weapons and critical goods, equipment and technologies. It controls the spread and delivery of such equipment and technologies that can cause destruction of any kind thus considering the international and regional peace and security.

E. Health Insurance Portability and Accountability Act (HIPAA) is an act that deals with the provision of medical data and health information protection. This information can also be in electronic form. So many health care systems and applications which provides security such as by controlling access to the medical information of an individual and at the same time provides facilities and flexibility by adopting new technologies which has improved the patient and health care.

F. The Payment Card Industry Data Security Standard PCI DSS deals with the protection of credit, debit and cash card transactions. PCI DSS have some policies regarding the security. These policies ensure to improve the security of the card transactions and the goal is also to provide the card holder with the protection from the misuse of their sensitive data. So the companies are required to accept or process the data of the cardholder in a secure way. This will protect the card holder against data breaches.

8 0
4 years ago
Other questions:
  • List the final state of the cache, with each valid entry represented as a record of &lt; index, tag, data &gt;.
    15·1 answer
  • A host sends a packet to a local server on the company's wired ethernet lan via an access point. how many frames are necessary f
    6·1 answer
  • Which of the following allowed Temple Grandin to design more humane means of slaughtering cattle? she treated the cattle as inca
    5·2 answers
  • The keyboard preferences pane includes a list of keyboard shortcuts.
    8·1 answer
  • The GNU/Linux operating system comes with many built-in utilities for getting real work done. For example, imagine you had to an
    10·1 answer
  • Assume hosts A and B are each connected to a switch Svia 100-Mbps links. The propagation delay on each link is 25μs. The switch
    15·1 answer
  • What is the importance of shape in graphic design?​
    5·2 answers
  • describe the role and importance of computers in New Media. Prepare a report on increasing interest and impact of mobile phones
    9·1 answer
  • Which of the following responses is the best example of a problem that can be solved using a computer program?
    6·2 answers
  • 1. The running configuration is also known as the _____________ (Select Two) a. Startup config b. Working configuration c. Curre
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!