1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksju [112]
3 years ago
8

What are the possible consequences of invasion of privacy?

Computers and Technology
1 answer:
Sergio039 [100]3 years ago
7 0
Jail time since you can be considered a spy or a perv. Whatever you aim is of course.
You might be interested in
The unthinkable happens and disaster strikes, crippling your network. You implement your disaster plan, but it doesn't go smooth
Degger [83]

Answer:

Post-mortem.

Explanation:

It refer to the discussion or analysis of event like here disaster why it doesn't work like plan based and through whole discussions what we learn so in future avoid such type of issue or mistakes.

7 0
4 years ago
Your boss (the IT director) wants to move several internally developed software applications to an alternate environment, suppor
satela [25.4K]

Answer:

A. PaaS

Explanation:

There are various cloud services like PaaS (platform as a service), IaaS (infrastructure as a service), SaaS (software as a service) etc.

The PaaS is a platform based service where online and adaptive environment is available to run software applications on several digital platforms. Unlike SaaS, it does not provide software services but an environment to install and run other applications.

7 0
3 years ago
Which view allows you to make changes to the content of your presentation?
Neporo4naja [7]

Answer:

Share your screen and edits the parts you want. What meet are you using, zoom or something else?

6 0
3 years ago
List three possible ways a company can process your data through<br> their privacy policy.
Feliz [49]

Answer:

A company will only process your personal data when they have a legal basis for doing so.

The legal basis to process personal data will one of the following:

1.For the performance of contract:  for recruitment process, for human resource management, and to manage those carrying out work on behalf of PI.

2.For legal requirement:  to comply with applicable regulatory obligations and employment law.

3.For their legitimate interests: to administer their website, to manage their donations, to carry out research and investigations and to manage volunteer.

7 0
3 years ago
(TCO 1) You want to find the IP address of an interface. How can you quickly do this?
defon

Answer:

Ping the interface using the cmd or terminal

Explanation:

5 0
3 years ago
Other questions:
  • Heatsinks used to protect cpus in computers from overheating, are shaped so that their surface area is very large. why is that?
    5·1 answer
  • How can you different between standard and protocol?
    15·1 answer
  • The difference between natural and technological system
    9·1 answer
  • After the following code runs, what will be the value of result? var x = 30; function get () { return x; } function set (value)
    10·1 answer
  • ____ are programs that need to be attached to other files to install themselves on computers without the users’ knowledge or per
    5·1 answer
  • What is one disadvantage of transmitting personal data using digital signals?
    15·2 answers
  • How many parameters can we use in each function?
    15·1 answer
  • C#
    10·1 answer
  • Radio spectrum is the part of the complete range of electromagnetic waves that is used for radio communication from
    14·1 answer
  • The new software analyzes sales conversion per sales in a way intended to increase sales success. what is the first thing you mu
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!