1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr1967 [171]
3 years ago
12

All of the following are technical solutions to protecting user privacy except: Group of answer choices Data use policies Anonym

ous email Preventing client computers from accepting cookies Email encryption Anonymous surfing
Computers and Technology
1 answer:
RoseWind [281]3 years ago
4 0

Answer:

Data use policies

Explanation:

Technically data use policies are not specifically made to protect user privacy, however it also should not violate user privacy. Data use policies are required by law. They are compulsory disclosures that list the various ways in which data in the form of personal data of individuals is collected, shared or used by digital companies(companies that operate on the internet, make use of email lists, etc ) are used.

You might be interested in
Write a definition in your own words for telecommunication. Do not cop and paste please.
34kurt

Answer:

Telecommunication is also known as telecom(s), is the exchange of information over significant distances by electronic means, referring to all types of voice, data, and video transmission. This is a broad term that includes a spacious telecommunication field called the electromagnetic wireless range of technologies and communications infrastructures, such as wired phones; mobile devices, such as cellphones; microwave communications; fiber optics; satellites; radio and television broadcasting; the internet; and telegraphs.

A complete, single telecommunications circuit consists of two stations, each equipped with a transmitter and a receiver. The transmitter and receiver at any station may be combined into a single device called a transceiver. The medium of signal transmission can be via electrical wire or cable -- also known as copper -- optical fiber, electromagnetic fields, or light. The free space transmission and reception of data by means of communications. information  

Explanation:

7 0
2 years ago
The ram called a volatile device select one:<br><br> a. false<br><br> b. true
Paraphin [41]
B. true

RAM (Random Access Memory) is volatile because if power is lost, so is your memory.
6 0
3 years ago
In Mandatory Access Control sensitivity labels attached to object contain what information?
larisa86 [58]

Answer:b)The item’s classification and category set

Explanation: Mandatory access control(MAC) is the security component in the computer system. It is regarding the controlling the access of the operating system by the administrator.The accessing is made limited by the MAC according to the sensitivity of the data .

The authorization for user to access the system is based on this sensitivity level known sensitivity label. The objects contain the information regarding the classification and categories or level of items. Thus, the correct option is option(b).

7 0
3 years ago
In order to use SliIn order to use Slicers to filter some data, what must you first do to that data?cers to filter some data, wh
lakkis [162]

Answer:

<em />

<em>Splicers provide buttons that you can click to filter tables, or PivotTables. In addition to quick filtering, slicers also indicate the current filtering state, which makes it easy to understand what exactly is currently displayed animation</em>

<em />

8 0
3 years ago
Help me please I dont have enough points for people just to get these for free
Gekata [30.6K]

Answer:

help me please I dont have enough points for people just to get these for free

Sam is a movie director. He has asked his storyboard artist to create an image of the central character looking ecstatic after receiving an award. What type of shot does the director need from the storyboard artist?

A. long shot

B. point of view shot

C. reaction shot

D. jump cut​

A is the asnwer

3 0
2 years ago
Other questions:
  • Collaborative filtering is
    10·1 answer
  • What are the requirements of a data dictionary ?
    7·2 answers
  • In reduced visibility conditions you need to work especially hard to gather visual information because
    7·1 answer
  • - If we place records from different tables in adjacent____________, it would increase efficiency of a database.
    14·1 answer
  • Please Do Solve it guys...
    6·1 answer
  • Why might it be a good idea to choose a bus topology?
    6·2 answers
  • Wilt short answer of the fol<br>What is an operating systeme te ay maglia<br>​
    12·1 answer
  • 4. In computers, an integer can be represented by more than 8-bit, what is the largest positive integer that
    9·1 answer
  • In the scenario below, select the evaluation factor that is most important.
    6·1 answer
  • TO Cloud
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!