1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svlad2 [7]
4 years ago
6

Third party providers of publicly available data sets protect the anonymity of the individuals in the data set primarily by a. R

emoving identifiers such as names and social security numbers. B. Leaving in identifiers (e.G., name), but changing other variables. C. Asking data users to use the data ethically. D. Letting individuals in the data know their data is being accessed.
Computers and Technology
1 answer:
VARVARA [1.3K]4 years ago
8 0

Answer:

A. Removing identifiers such as names and social security numbers

Explanation:

The process of removing personal information which can serve as identifiers for a particular individual from a set of data is known as De-Identification or Anonymization. The main purpose of De-identification is to help protect an individuals information so that identifiers such as n<em>ame and social security numbers </em>cannot be linked to that individual. However, the process of restoring the data back to its original state is known as Re-Identification.

You might be interested in
What type of trust model is used as the basis for most digital certificates used on the internet?
vesna_86 [32]

The type of trust model that is used as the basis for most digital certificates used on the internet is known to be option B. distributed trust.

<h3>What is the trust model of the Internet?</h3>

The trust model of the internet is known to be one that is made up of tradeoffs.

Note that Distributed trust is seen as the system that is made up of transactions and it is one that is backed up by an extended community and onw where there is no trusted third parties.

Hence, The type of trust model that is used as the basis for most digital certificates used on the internet is known to be option B. distributed trust.

See full question below

What type of trust model is used as the basis for most digital certificates used on the Internet?

A. third-party trust

B. distributed trust

C. related trust

D. managed trust

Learn more about digital certificates from

brainly.com/question/24931496

#SPJ1

3 0
2 years ago
when doing a complex presentation which of the fallowing will be the best tool to begin designing your presentation
qaws [65]

but where are the option bro

7 0
2 years ago
Read 2 more answers
Write an algorithm to sum to values
Elis [28]

Answer:

There is no need to make an algorithm for this simple problem. Just add the two numbers by storing in two different variables as follows:

Let a,b be two numbers.

c=a+b;

print(c);

But, if you want to find the sum of more numbers, you can use any loop like for, while or do-while as follows:

Let a be the variable where the input numbers are stored.

while(f==1)

{

printf(“Enter number”);

scanf(“Take number into the variable a”);

sum=sum+a;

printf(“Do you want to enter more numbers? 1 for yes, 0 for no”);

scanf(“Take the input into the variable f”);

}

print(Sum)

Explanation:

hi there answer is given mar me as brainliest

5 0
3 years ago
Suppose that a queue is implemented using a circular array of size 12. What is the value of last after the following operations?
otez555 [7]

Answer:

10

Explanation:

An enqueue operation is a function that adds an element(value) to a queue array. A dequeue operations removes an element from a queue array. Queue arrays follow a first-in-first-out approach, so elements that are first stored in the queue are removed/accessed first(enqueue operations add elements at the rear of the queue array).

The following operations leave 10 elements in the queue of array size 12 after its done:

10 enqueue operations= adds 10 elements

5 dequeue operations= removes 5 elements( 5 elements left in queue)

6 enqueue operations= adds 6 elements(11 elements in queue)

10 dequeue operations= removes 10 elements(1 element left in queue)

8 enqueue operations= adds 8 elements(9 elements in queue)

2 dequeue operations= removes 2 elements(7 elements left in queue)

3 enqueue operations= adds 3 elements(10 elements in queue)

Therefore there are 10 elements in the queue after enqueue and dequeue operations.

8 0
3 years ago
Create a program to compute the fee for parking in a garage for a number of hours. The program should: 1. Prompt the user for ho
Harman [31]

Answer:

The ans will be given in the python script below. A picture of the answer is also attached

Explanation:

print("Welcome To Garage Parking Fee Calculator")

hours = float(input("Type the number of hours parked :  "))

#fee per hour

rate = 2.40

#multiply rate per hour by the number of hours inputted

price = rate * hours

if price < 6:

   price = 6

if price > 20:

   price = 20

print("Parking fee is:  $", +price)      

7 0
3 years ago
Other questions:
  • Microsoft words spell checker
    8·1 answer
  • A car moves down the street at 45 kph. The driver takes his foot off the gas pedal but does not brake. Which is the correct expl
    5·2 answers
  • We say that a sequence of numbers is a palindrome if it is read the same backward or forward. For example, the sequence: 6, 15,
    11·1 answer
  • Search engines are used to find a specific entry in a database.<br><br> True or false?
    9·2 answers
  • Are Proxy Servers illegal if im using it to surpass Facebook or something because it is banned
    12·1 answer
  • What tasks should a laptop accomplish?
    15·1 answer
  • Employing the use of a(n) <br> will help you manage a STEM project.
    13·1 answer
  • Can someone please entertain me and talk right now, because I'm just so bored that I may lose my mind.
    6·1 answer
  • ________ is used to enter the results of a CBC into the computer system.pharmacy system.laboratory system.order entry/results re
    12·1 answer
  • A ________ implementation involves considerable modifications to the erp software
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!