1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
4 years ago
7

In an open computer network such as the internet, hipaa requires the use of _____. in a closed system such as a local area netwo

rk, hipaa allows ______________ as controls.
Computers and Technology
1 answer:
Marianna [84]4 years ago
4 0

I guess the answer on the first blank is Data encryption and on the second blank is Sign-on codes and passwords.

In an open computer network such as the internet, HIPAA requires the use of Data encryption. in a closed system such as a local area network, HIPAA allows Sign-on codes and passwords as controls.

You might be interested in
Describe the operation of IPv6 Neighbor Discovery. ​
max2010maxim [7]
Can you give me the link to an article about this so i may help?
6 0
3 years ago
Which of the following is not a language commonly used for web programming? PHP Assembly Java Python
Nataly [62]

Answer:

If you’re a software developer, then you probably—every now and then—feel overwhelmed by the super-fast pace at which our industry evolves, and that’s fine. I certainly feel that way sometimes, especially when trying to keep up with the latest trends.

But it’s possible to be well-informed about what’s going on out there, and use that information to your advantage, by being economical about your learning.

Sure, there are lots of programming languages. Sure, new ones keep being created every week—and don’t even get me started on JavaScript frameworks.

Do you need to learn all of them? Of course not.

First, learn about a number of the most popular programming languages. Then, narrow that list down, by picking the ones that make the most sense for your current knowledge level, employment status and other criteria that might make sense for your scenario.

For instance, if you intend to learn the functional paradigm, then pick a functional language from the list. Rinse and repeat.

That’s what this post is about. We’ve done the legwork for you, compiling a list of five of the most popular programming languages for 2019. Now you only have to read it and put it to good use.

(Hope this helped if not i am so so sorry hope you have a blessed day goodbye)

7 0
3 years ago
Read 2 more answers
What does ascii stand for?
tamaranim1 [39]
ASCII—American Standard Code for Information Interchange
7 0
3 years ago
Read 2 more answers
Write the code to call a function named send_variable and that expects a single int parameter. Suppose a variable called x refer
NemiM [27]

Answer:

<em>#include <iostream></em>

<em>using namespace std;</em>

<em>//function definition</em>

<em>void send_variable(int num){</em>

<em>    cout<<"The Number is "<<num<<endl;</em>

<em>}</em>

<em>// main function begins here</em>

<em>int main()</em>

<em>{</em>

<em>    int x =15; //declares an it variable and assigns 15</em>

<em>    // Calls the function send_variable</em>

<em>    send_variable(x);</em>

<em>    return 0;</em>

<em>}</em>

Explanation:

Using C++ programming language we created the function called send_variable and in the main function we call this function which only displays the value of an int variable passed unto it.

6 0
3 years ago
Can you answer my question it's a bit confusing to me! I'm adding brainlist too!
Inessa05 [86]

Answer:

Double spaced means more space in between lines and there is an option in Google Docs or Word to make it double spaced. One inch margin means that there is one inch between the edge of the paper and where the words start.

6 0
3 years ago
Other questions:
  • Colours in art packages are often given Hex codes as illustrated below with #00ccff. Why is Hex used in this way rather than the
    11·1 answer
  • Write code to print the location of any alphabetic character in the 2-character string passCode. Each alphabetic character detec
    8·1 answer
  • It is vital to the organization and the success of the disaster recovery plan that the plan be thoroughly tested on a(n) _______
    5·1 answer
  • Convert 4.5 strides to girth
    10·1 answer
  • To build a framework for security policies and controls, one can use the following approach: 1) document the concepts and princi
    12·1 answer
  • What is an example of bias in media?​
    9·1 answer
  • The answer is D!!Readable code includes
    9·2 answers
  • Which of the data repositories serves as a pool of raw data and stores large amounts of structured, semi-structured, and unstruc
    9·1 answer
  • If the larger gear is the
    15·1 answer
  • HURRY- I’ll give 15 points and brainliest answer!!
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!