1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_lady [41]
3 years ago
15

How do assignment article computer security, ethics and privacy?

Computers and Technology
1 answer:
Softa [21]3 years ago
5 0
Explain those things:
Security-What is used to protect.
Ethic-The will to.
Privacy-Is secrecy.
You might be interested in
Highlights the possible risks and problems that should be addressed during the implementation process
Llana [10]

Answer:

The answer is below

Explanation:

Since the type of Implementation is not stated specifically, it is believed that, the question is talking about ERP Implementation, because it is related to subject in which the question is asked.

Hence, Enterprise Resource Planning (ERP) implementation deals basically, by carrying out installation of the software, transferring of finanancial data over to the new system, configuring application users and processes, and training users on the software

ERP Implementation Risks involve the following:

1. Inefficient Management and Project Activities.

2. Inadequate or No Training and Retraining of Customers or End-Users.

3. Inability to Redesign Business Processes to meet the Software requirements.

3. Incompetent or lack of Technical Support Team and Infrastructure.

4. Incapability to Obtain Full-Time Commitment of Employee.

5. Failure to Recruit and Maintained Qualified Systems, and Developers.

6 0
4 years ago
A technician is tasked with installing the Windows OS on a Mac OS computer so that the computer can boot to either the Mac OS or
nata0808 [166]

Answer:

Key chain because it easier

Explanation:

4 0
2 years ago
A nonprofit organization uses a contact management database to track donations, amounts donated, and all correspondence and phon
notka56 [123]

Answer:

nvbvbnvvbnbnvbnvbn

Explanation:

vbnvbnvbnbnnnbvnn

7 0
3 years ago
Write an INSERT statement that adds this row to the Categories table: category_name: Brass Code the INSERT statement so MySQL au
nexus9112 [7]

Answer:

Query:

insert into Categories (category_name) values ('Brass Code');

Explanation:

  • The query is a medium through which a user of the database can communicate with the database or tables or any particular data. It means that when a user wants to access the database or tables or any data then there is a medium of query which is also known as SQL query.
  • The query can help to make the database(which is a collection of tables), make the table in the database, add the data, modify the data or delete the data.
  • For add the data there is a insert query which syntax is as follows: insert into table_name (column_1_name,column_2_name,....,column_n_name) values (column_1_values,column_2_values,....,column_n_values);
  • There is only one column value in the question which a user needs to add so that can be done by the help of a statement that is defined on the answer part.
5 0
4 years ago
Name the wireless technology that may work with one device and not with another.
horsena [70]

Answer: Im guessing b

Explanation:

bc the other ones work devices.

7 0
3 years ago
Other questions:
  • Mitchell is assisting her teacher in a project by entering data into the spreadsheet. Which types of data can Michelle enter in
    14·2 answers
  • How has social media changed professional networking?
    11·1 answer
  • Manny has created more than one hundred bookmarks. When he looks at the menu, he has to scroll through a very long list of bookm
    15·1 answer
  • According to Fourman, Informatics is _______________ with a very _____________ scope.
    5·2 answers
  • A computer with 5 stage pipeline like the one descrive in class delas with conditional branches by stalling for the next three c
    5·1 answer
  • The internet is owned and run by the us government. a) true b) false
    12·2 answers
  • FREE POINTS FIRST TO ANSWER GETS BRANLIEST!!! :)
    11·2 answers
  • Question #4
    9·1 answer
  • Pls paanswer asap......​
    10·1 answer
  • Computer networks that use packet switching are less efficient than telephone networks that use circuit switching.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!