1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya [120]
3 years ago
14

Which of the following is an image that enhances comunaction? Illustration, logo, maps, or visual cue

Computers and Technology
1 answer:
melamori03 [73]3 years ago
6 0

The answer is A.  Illustration

You might be interested in
Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correl
Anettt [7]

Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

<h3>What is anonymization?</h3>

The term anonymization is known as data masking and it is the standard solution in the case of data pseudonymisation. It is generally recognised by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Data is generally identified by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Therefore, Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

Learn more about anonymization here:

brainly.com/question/4268168

#SPJ4

5 0
2 years ago
Do the police check your mobile device during police checks?
JulsSmile [24]

They cannot legally check it without a warrant.


Depending on the circumstances of the arrest/check, and the method of seizure of the mobile device, you are subject to a certain set of rights, laws, or protections. First off, know that it is your right to decline the warrantless search of your mobile phone. If you are arrested or taken into police custody, you should verbally state that you do not consent to a search of your devices. A law enforcement agency is only permitted to conduct a warrantless search of your device if a compelling case for an emergency can be made.


If the authorities are using evidence obtained through an unlawful search of your mobile device against you in a criminal proceeding, you can move for that data to be suppressed under the Fourth Amendment right to freedom from incidental seizures.

4 0
3 years ago
How to get the blade out of a pencil sharpener?
agasfer [191]
Poke hole with thin but strong object
Or buy new sharpener
7 0
3 years ago
In Excel, ____ is/are used to place worksheet, column, and row titles on a worksheet.
vladimir1956 [14]
In excel, [Text] is used to place worksheet, column and row titles on a worksheet.
In excel you can inset text to make comment, to input words or number and to make title. 
8 0
2 years ago
Riley needs more storage space on his small laptop, and he needs that storage to be accessible without Internet access. What is
galina1969 [7]

Answer:

i cloud

Explanation:

but if you dont gota paypal youd want to get like an std card or somthime

8 0
3 years ago
Other questions:
  • Jason is an aspiring filmmaker. He manages finance and makes sure that everyone is involved in the project. Which role is Jason
    12·1 answer
  • 1. Why is it important to compare features of a computer before making a purchase?
    13·2 answers
  • Which of the following describe a required
    7·1 answer
  • Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the co
    6·1 answer
  • How does the teacher know you have completed your assignment in Google Classroom?
    12·1 answer
  • Explain why you cannot the Apple OS install on a regular windows computer and vice versa, without the aid of a virtualization so
    5·1 answer
  • Tightly.
    5·1 answer
  • Write a recursive method to form the sum of two positive integers a and b. Test your program by calling it from a main program t
    8·1 answer
  • David is taking a test. To answer a question, he first covers up the answer choices. Next, he tries to answer the question. Then
    15·2 answers
  • A software is made from​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!