1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ra1l [238]
3 years ago
8

Companies expose themselves to harsh sanctions by federal agencies when they violate the privacy policies that their customers r

ely upon.
a. True
b. False
Computers and Technology
1 answer:
Umnica [9.8K]3 years ago
3 0

Answer:

True

Explanation:

A privacy policy is a legal document or statement that discloses the ways a party gathers uses and manages a customer's data. These data include personal information such as address, name, financial records, medical history, travel records etc.

Policies such as the Children Online Privacy Protection Act which protects children on websites collecting children's data, the Gram-Leach-Bliley Act, The Health Insurance Portability and Accountability Act, are in place to ensure that privacy is protected and sanctions are metted out to violating companies.

You might be interested in
Computer science is a blank process
PSYCHO15rus [73]

i agree... its a interesting thing to learn, just like learning an actual new language.

4 0
2 years ago
Read 2 more answers
Investigate the many ways that hardware and software can cause an interrupt to occur. Are ALL interrupts treated equally or do s
slavikrds [6]

Answer:

Following are the responses to the given question:  

Explanation:

This list is based mostly on the processor. Then you'll be ordered. An interrupt of a particular cable (wire) is produced for PC-ish CPUs (IRQ 0 - 31 for some intel processors). The bigger challenge is a lower number.

Strange factors have included a system clock, power business, 0, some reserved for use by CPU testing, serial/parallel/... ports and also some terminated/error/state/new devices requests device Thus a key touch on the keyboards could create an interrupt that was direct on old devices.

3 0
2 years ago
[100 points] Fill in the missing word.
Makovka662 [10]

answer:The cat lady has 3 left cause of the amount

Explanation:

6 0
2 years ago
In the circuit shown in the figure above, what will happen when switches S1 and S3 are both closed? 
sp2606 [1]

Well, ya see, we need to have the picture of the circuit.

8 0
3 years ago
Can you think of other businesses that might benefit from using voice response this system?​
sergey [27]

Answer:

call centers benfit big in this field

Explanation:

5 0
3 years ago
Other questions:
  • Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns
    7·1 answer
  • I damaged a k12 laptop. do I have to pay for the damage? and if so how much?
    5·1 answer
  • What is the difference between 1080p and 2k?
    14·1 answer
  • If r is an instance of the above Person class and oddNum has been declared as a variable of type boolean, which of the following
    8·1 answer
  • How would a programming language that allows programs to run on any operating system be classified?
    11·1 answer
  • Suppose you want your firewall to block all incoming Telnet connections but to allow outbound Telnet connections. One approach w
    9·1 answer
  • Which is an unethical use of technology and resources at the workplace?
    13·2 answers
  • 11.
    9·2 answers
  • Which of the following actions can NEGATIVELY impact your credit score?
    9·1 answer
  • 20 POINTS AND BRAINLIEST TO CORRECT ANSWER
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!