1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
expeople1 [14]
3 years ago
11

You have a client who writes "cookies" to help businesses target their largest group of interested customers by data mining pers

onal information from the people who surf onto his Web site. The best advice you can give him is to post his intended use of the information in his privacy policy and to make his privacy policy available from every page of his Web site.
True
False
Computers and Technology
1 answer:
STatiana [176]3 years ago
3 0
Hi!

The answer to this is True

You always want to transparent with how you are going to use someone's information and how you are going to keep it private.
You might be interested in
A computer that delivers requested web pages to your computer or mobile device is a(n) _____.
yaroslaw [1]

Answer:

Web Server

A web server is server software, or hardware dedicated to running this software, that can satisfy client requests on the World Wide Web. A web server can, in general, contain one or more websites. A web server processes incoming network requests over HTTP and several other related protocols.

6 0
4 years ago
The Integrated Services Digital Network (ISDN) sends telephone transmissions across what type of lines?
PtichkaEL [24]

Answer:

The correct answer to the following question will be "Digital".

Explanation:

A digital line seems to be a type of line of communication that requires only binary code for transmission and release.

  • ISDN (Integrated Services Digital Network) is a wireless enterprise-only connection that links a conventional phone system to the telephone line, enhancing the visibility and efficiency of communications.
  • It is indeed a series of connectivity protocols across the conventional networks of the community activated mobile phone network enabling seamless wireless delivery of audio, display, content, and other related services.
6 0
3 years ago
What are the two methods of creating a folder​
son4ous [18]

Answer:

1. right click empty space, go to New, and click New Folder

2. press Ctrl + Shift + N

Explanation:

5 0
2 years ago
the first thing to do when your computer gives you an error message is A restart the computer B press the F2 key C write down th
lesya692 [45]

Answer:

I think you should restart the computer

6 0
1 year ago
1. Identify three reasons for sending a professional business letter.
Vaselesa [24]

Answer: Here are some reasons why you might send a professional business letter:

1. It will make the recipient trust and respect you more.

2. It shows that you are a good and respectable business person.

3. It shows that you put time and effort into your business dealings no matter how small.

4. It shows that you respect the recipient as sending a professional business letter is harder than simply sending a text.

Hope this helps!   :)

Explanation:

8 0
4 years ago
Other questions:
  • You create hidden form fields with the ____ element.
    9·1 answer
  • Informs the network interface card to pass packets sent to that address to the ip stack so their contents can be read, and tells
    9·1 answer
  • Write a class called MagicSquare, which contains a single method called check that accepts a two-dimensional array as an argumen
    7·1 answer
  • Which term describes the order of arrangement of files and folders on a computer
    11·1 answer
  • An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel i
    12·1 answer
  • 1. (1 pt) Suppose you wish to run a program P with 37.5 x 109instructions on a 15 GHz machine with a CPI of 0.75. What is the ex
    9·1 answer
  • 4. UPS stands for Uninterrupted Power Supply . (Yes /no
    11·1 answer
  • provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,
    11·1 answer
  • What types of standards are developed by the Electronics Industries Alliance (EIA)?
    14·2 answers
  • The sign used for closing a tag is​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!