1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
13

Pls help due tonightWill give brainiest

Computers and Technology
2 answers:
katrin2010 [14]3 years ago
8 0
HIPPA law is Health Insurance Portability and Accountability Act of 1996. It’s a federal law that helps consumers maintain their insurance coverage.
-BARSIC- [3]3 years ago
3 0

Answer:

HIPPA Is Health Insurance Portability and Accountability Act It helps protect health insurance.

COPPA Is Children's Online Privacy Protection Act it helps protect children's online privacy.

ECPA Is Electronic Communications Privacy Act and it helps protect electronic communications for privacy. I'm 95% sure.

Gramm-Leach-Bliley ACT is GLBA.

NDA Is Non-Disclosure Agreement. I'm not so sure about when one is needed though.

You might be interested in
I made a fish emoji what do you think >{'_'}< should I change anything
Anvisha [2.4K]

Answer: It is beautiful

Explanation:

3 0
3 years ago
Read 2 more answers
Can you get shocked from a breaker box?
Mashcka [7]
I dont think it would, but maybe you should Google it just in case.
4 0
4 years ago
Jill uses Word to create an order form. She starts out by creating a table that has three columns and ten rows. What should she
kifflom [539]
A is the best answer
I hope it’s work
5 0
3 years ago
Which of the following generally does not apply to all seven domains of an IT infrastructure? Incident response Service level ag
almond37 [142]

Answer:

Option C, Disaster recovery plan

Explanation:

The seven domains of IT are

User Domain

System/Application Domain

LAN Domain

Remote Access Domain

WAN Domain

LAN-to-WAN Domain

Workstation Domain

To these seven domain, the Disaster recovery plan only applies to the LAN-to-WAN Domain as it is vulnerable to corruption of data and information and data. Also, it has  insecure Transmission Control Protocol/Internet Protocol. (TCP/IP) applications and it at the radar of Hackers and attackers

4 0
3 years ago
Which sentences use antonyms to hint at the meaning of the bolded words? Check all that apply.
Leto [7]

Answer:

dunno

Explanation:

7 0
3 years ago
Other questions:
  • The main characteristic of ____ is that its source code is published with the software.
    7·1 answer
  • What is it called when you make predictions within given data?
    13·1 answer
  • Technician A says that PTC heaters can be built into a conventional heater core assembly. Technician B says that a PTC heater's
    11·1 answer
  • What is the big-O performance estimate of the following function?
    15·2 answers
  • MULTIPLE CHOICE:
    15·1 answer
  • In batch operating system three job J1 J2 and J3 are submitted for execution each job involes an I/O activity a CPU time and ano
    13·1 answer
  • Pleasee help. How do you fix this problem in discord?
    10·1 answer
  • Each sentence in the paragraph below has a number. Choose the number of two sentences that are in the wrong order in this story.
    14·1 answer
  • With which feature or menu option of a word processing program can you make an image like this?
    14·2 answers
  • What maintains data about various types of objects, events, people, and places?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!