1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
3 years ago
12

Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the

consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected?
Computers and Technology
1 answer:
Tom [10]3 years ago
7 0

Answer:

Gramm-Leach-Bliley Act

Explanation:

Under the Gramm-Leach-Bliley Act, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used and how the data is protected.

The law stipulates that for any consumer with a financial institution, the financial institution should make provision of a privacy notice. This privacy notice outlines in explicit details the following; what data about the consumer is gathered, with whom that data is shared, how the data is used and how the data is protected.

This was done in order to protect the consumer right and the right of the financial institution.

You might be interested in
Is wireless or wired network faster??
bogdanovich [222]

Answer:

Wired

Explanation:

3 0
3 years ago
Read 2 more answers
PLEASE HELP THIS WAS DUE YESTERDAY AND I DIDN'T GET TO IT IN TIME!!!!!!
kykrilka [37]

Answer:

dDAgv

Explanation:

sdc sdc sdc trust me

7 0
3 years ago
On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control
Mila [183]

Answer:

c. traffic shaping

Explanation:

A traffic shaping system is one that allows to adapt the incoming data traffic that comes from some node of the network giving it a special treatment called conformation of accepted traffic and thus allowing the frames to be forwarded through the network of data under traffic rules without having gone through some traffic shaping method, this can be detected as non-conforming traffic at the edge of access to the discarded metropolitan network.

Traffic shaping is a mechanism that alters the traffic characteristics of the cell flow of a connection to achieve better network efficiency while maintaining QoS objectives or in order to ensure that the cell flow conforms to traffic parameters according to the leaky bucket algorithm configuration of the traffic contract. Traffic shaping can be used in ATM, for example, to reduce peak speed, limit the length of the burst by means of adequate spacing of cells over time. The use and location of this function is network specific.

5 0
3 years ago
Please help!! thank you so much!! <3
Zepler [3.9K]

Answer:

D. 4x as much

Explanation:

The answer is pretty simple. The question is asking about 10m/s and 20m/s right? Take a look at the energy at each point on the graph. At 10m/s the kinetic energy is 100 on the graph. At 20m/s the kinetic energy is 400. You'll notice that 100 x 4 is 400 - That's the answer.

You can also prove this mathematically. The formula for kinetic energy is

\frac{1}{2}mv^2

The question says: constant mass so we can ignore that for now.

(1/2) * 10^2 is (1/2) * 100 = 50

for the 20m/s ball it would be

(1/2) * 20^2 = 400 * 1/2 = 200

Once again, you see that it is 4x

3 0
3 years ago
Read 2 more answers
An insurance company utilizes SAP HANA for its day-to-day ERP operations. Since they can’t migrate this database due to customer
hichkok12 [17]

Answer: An Internet-routable IP address (static) of the customer gateway's external interface for the on-premises network

Explanation:

Based on the information given, an Internet-routable IP address (static) of the customer gateway's external interface for the on-premises network need to be configured outside of the VPC for them to have a successful site-to-site VPN connection.

The Internet-routable IP address will be used in the identificatiob of each computer through the use of the Internet Protocol for the communication over a network.

3 0
3 years ago
Other questions:
  • What is a fragment shader? Question 5 (3 marks) What is trilinear filtering?
    8·1 answer
  • QUESTION
    10·1 answer
  • HELP ILL MARK BRAINLIETS!! What kind of statement is used to determine which path a program will take? priority statement
    8·2 answers
  • Which of the following does not use a Graphic User Interface?
    14·1 answer
  • What should be used to screw on broadheads? needle-nose pliers gloves thumb and forefinger only specially designed wrench
    6·1 answer
  • Choose the answer. Janice's IT department found that her computer had a program on it that was collecting her personal informati
    5·1 answer
  • Answer to this problem
    11·1 answer
  • A ____ is a a set of presentation rules that control how text should look. It is applied to an XML file to change the collection
    9·1 answer
  • 1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an eve
    13·1 answer
  • What are the three algorithm constructs?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!