1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
13

Pls help due tonightWill give brainiest

Computers and Technology
2 answers:
katrin2010 [14]3 years ago
8 0
HIPPA law is Health Insurance Portability and Accountability Act of 1996. It’s a federal law that helps consumers maintain their insurance coverage.
-BARSIC- [3]3 years ago
3 0

Answer:

HIPPA Is Health Insurance Portability and Accountability Act It helps protect health insurance.

COPPA Is Children's Online Privacy Protection Act it helps protect children's online privacy.

ECPA Is Electronic Communications Privacy Act and it helps protect electronic communications for privacy. I'm 95% sure.

Gramm-Leach-Bliley ACT is GLBA.

NDA Is Non-Disclosure Agreement. I'm not so sure about when one is needed though.

You might be interested in
What are the seven internal compontents of a computer
likoan [24]
Motherboard, CPU, fans, Hard drives,Power Supply,Optical Drives and RAM
4 0
3 years ago
Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this fu
Amiraneli [1.4K]

Answer:

yes administrators have to be concerned

Explanation:

It is necessary for countermeasures to be taken against DoS attacks

The types of attacks that can still occur are:

If the network connection get to be overloaded,  there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd  we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.

To reduce the impact of this kind of attacks,

1. there should be enough or excess network bandwidth  and distributed servers should be replicated if there is a possibility that network could get to be overloaded.

2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.

3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters

4. Use strong antivirus on computer sytems that are used to connect to the internet

7 0
3 years ago
If Windows does not automatically detect a newly added device, to get the device recognized and the drivers installed, you shoul
Artyom0805 [142]

Answer:

Update the device driver

Explanation:

Devices drivers are softwares used to link a component of the computer to the operating system functionality.

It normally comes with the installed operating system, but most plug and play devices , come with a little built-in OS that runs once it is plugged in.

If a device is not recognized, update the driver software and restart the system.

3 0
2 years ago
You have purchased a printer that has the capability to print in duplex mode so that users can print on both sides of a sheet of
fiasKO [112]

If you have purchased a printer that has the capability to print in duplex mode so that users can print on both sides of a sheet of paper. However, when users try to use this capability when they send a print job, documents are still printed on only one side. Then there might be a problem with (d) THE DUPLEX MODE NEEDS TO BE ENABLED ON THE DEVICE SETTINGS TAB IN THE PRINTER'S PROPERTIES.

Explanation:

  • If the duplex mode isn't enable on the printer setting, then the printer is still going to read that the output should come in a single page and not in the duplex mode.
  • When facing such a problem, the user should go to the "Device Settings" tab in the printer properties and change the required settings to print according to the users needs.

7 0
3 years ago
at the bank there is 4 lines with 7 costumers and there are five customers left over. how many customers are there​
mrs_skeptik [129]
Answer: 33
7 times 4 is 28 add the left over 5 makes 33 people
4 0
2 years ago
Other questions:
  • A hard drive cannot be partitioned until the device _________ is set.
    15·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    6·1 answer
  • Which of the following payment types require you to pay upfront?
    9·1 answer
  • If your vehicle leaves the pavement for any reason, remember to take your foot off the gas pedal, hold the wheel firmly, and____
    8·2 answers
  • Describe an energy problem a city in 2050 will face
    6·1 answer
  • What is the definition of a flowchart? *
    13·1 answer
  • Because of increasing advances in technology, there are careers available that weren’t even invented 10 years ago. One such care
    13·1 answer
  • Using a computer application is known as​
    11·1 answer
  • Question 8 A data analyst is working with a data frame named stores. It has separate columns for city (city) and state (state).
    12·1 answer
  • Which part of the computer is responsible for managing memory allocation for all applications
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!