1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
likoan [24]
3 years ago
12

Alexandria works for a non-profit company that asks for donations to help the homeless people in her community. Recently the dat

abase that holds all the contact information about the doners was hacked, and all the data was copied.
What type of data was taken?

A. PII
B. PHI
C. PCI
D. GDPR
Computers and Technology
1 answer:
Rudiy273 years ago
3 0

Answer:

A. PII

Explanation:

PII (Personally identifiable information) is any data that will be useful in identifying a particular individual e.g full name, date of birth, etc. A donors detail in the database will surely be the data to be used to identify him personally.

You might be interested in
Subscribe to my you tube channel to get all your questions answered
vredina [299]

kaaaaaaaaaaaaaaaaa

aaa

4 0
3 years ago
What is the maximum number of communication paths for a team of twenty people?
MAVERICK [17]
Each of the 20 people has 19 other people to communicate to. If you add that all up you get 20*19 paths, but then each path is counted twice (back and forth), so we divide this by 2. 20*19/2 = 190.

The general forumula is n(n-1)/2
6 0
4 years ago
_____ allows you to use the internet for making phone calls instead of leasing traditional telephone lines from the phone compan
TEA [102]
Using a browser would help in doing that.
3 0
3 years ago
Follow me on Tik-Tok​
ivanzaharov [21]

Answer:

Sure

Explanation:

5 0
3 years ago
Read 2 more answers
How would a programming language that allows programs to run on any operating system be classified?
Illusion [34]
Cross-platform.





--------------------
3 0
3 years ago
Other questions:
  • The strFirstName and strLastName variables contain the strings "Jane" and "Jones," respectively. Which of the following statemen
    14·1 answer
  • Which kind of software allows users to draw pictures, shapes, and other graphical images with various on-screen tools such as a
    14·1 answer
  • B) If you send me an email, then I will finish my program. If you do not send me an email, then I will go to sleep early. Theref
    10·1 answer
  • Select the correct answer.
    6·1 answer
  • When clients connect to a web server using the _________ method, the server logs them on using the iusr account, by default?
    14·1 answer
  • Write a python statement that print the number 1000
    6·1 answer
  • What do macOS and Windows use to prevent us from accidentally deleting files?
    15·1 answer
  • it is good to know and use the npsd framework while solution envisioning as part of the value discovery cycle. What is NPSD?
    10·1 answer
  • sing the drop-down menu, identify the flowchart symbols. The oval represents the . The rectangle represents the . The diamond re
    9·2 answers
  • Suppose a packet is 10K bits long, the channel transmission rate connecting a sender and receiver is 10 Mbps, and the round-trip
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!