1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
13

Pls help due tonightWill give brainiest

Computers and Technology
2 answers:
katrin2010 [14]3 years ago
8 0
HIPPA law is Health Insurance Portability and Accountability Act of 1996. It’s a federal law that helps consumers maintain their insurance coverage.
-BARSIC- [3]3 years ago
3 0

Answer:

HIPPA Is Health Insurance Portability and Accountability Act It helps protect health insurance.

COPPA Is Children's Online Privacy Protection Act it helps protect children's online privacy.

ECPA Is Electronic Communications Privacy Act and it helps protect electronic communications for privacy. I'm 95% sure.

Gramm-Leach-Bliley ACT is GLBA.

NDA Is Non-Disclosure Agreement. I'm not so sure about when one is needed though.

You might be interested in
Question 5 / 15
erastova [34]

The value that would be returned based on the formula [=COUNTIF(A43:A47, "NP*")] in cell A49 is 4.

Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., so as to avail its end users the ability to analyze and visualize spreadsheet documents.

In Microsoft Excel, there are different types of functions (predefined formulas) and these include:

  • Sum function
  • Average function
  • Minimum function
  • Maximum function
  • Count function

A count function is typically used to to calculate the number of entries in a cell or number field that meets a specific (predefined) value set by an end user.

In this scenario, "NP*" is the specific (predefined) value that was set and as such the value that would be returned based on the formula in cell A49 is 4 because A43, A44, A45 and A46 contain the value "NP."

Read more on Excel formula here: brainly.com/question/25219289

7 0
1 year ago
Read 2 more answers
You want to discard your old computer and want to securely erase the data from your hard drive. What can you use to do this and
qwelly [4]
Go here this should help bunches!
http://www.microsoft.com/security/online-privacy/safely-dispose-computers-and-devices.aspx
Hope this website helps!
5 0
3 years ago
A downloaded executable file may contain harmful software known as
mylen [45]

Answer:

A downloaded executable file may contain harmful software know as malware.

Further details:

Malwares:

Malware (a portmanteau for pernicious programming) is any product purposefully intended to make harm a PC, server, customer, or PC network. Malware does the harm after it is embedded or brought somehow or another into an objective's PC and can appear as legitimately executable code, contents, supposed "dynamic substance" (Microsoft Windows), and different types of data. Some sorts of malware are to a great extent alluded to in the media as PC infections, worms, Trojan steeds, ransomware, spyware, adware, and scareware, among different terms. Malware has a malignant expectation, acting against the enthusiasm of the PC client—thus does exclude programming that causes accidental damage because of some lack, which is regularly portrayed as a product bug.

Uses:

Malware is once in a while utilized comprehensively against government or corporate sites to assemble monitored information, or to upset their activity as a rule. However, malware can be utilized against people to pick up data, for example, individual recognizable proof numbers or subtleties, bank or charge card numbers, and passwords.

Answer details:

Subject: Computer and technology

Level: College

Keywords:

• Harmful software

• Malware

• Malware software

• Uses of malware

• Purpose of malware

Learn more to evaluate:

brainly.com/question/4997492

brainly.com/question/4010464

brainly.com/question/1754173

8 0
3 years ago
Read 2 more answers
Sub to the channel plz plz
Hunter-Best [27]

Answer:

um

Explanation:

6 0
2 years ago
Read 2 more answers
How bridges are built over water
Black_prince [1.1K]
It’s all depending on what method
4 0
1 year ago
Other questions:
  • From the video "Your Password Sucks", using computer power to guess your password by trying multiple variations one after the ot
    15·2 answers
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect t
    10·1 answer
  • Given two Generic variables, A with value "123" and B with value 456, what would the Write Line output of A + B be? 123456 579 A
    5·1 answer
  • my airpods just do not seem to connect if i try to pair them, reset them, they have this continuous green light, please help me
    12·1 answer
  • What are ip addresses? why are these important for forensic scientists?
    5·1 answer
  • Which option is the correct format of placing HTML tags while coding in HTML?
    13·2 answers
  • Brainly not working for me not showing any ads or answers
    5·2 answers
  • Identify and state the value of hardware components​
    12·1 answer
  • To use the replace feature we can simply just press Carl+h,Carl+c,Carl+r
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!