1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
3 years ago
6

Can someone answer these for me real quick I have to bring up my grade please and thank you​

Computers and Technology
1 answer:
stealth61 [152]3 years ago
4 0

I'm hoping this hasn't already been answered, am sure I saw a similar post.

12.Noise

13. Wow.... that is worded so awkwardly. Am assuming it's terminator, because it's the only option there that is a physical device.  

14.Terminator

You might be interested in
Privacy laws in other countries are an important concern when performing cloud forensics and investigations. You've been assigne
Klio2033 [76]

Answer:

See the explanation for the answer.

Explanation:

Australian regulations makes extremely difficult for the enterprises to move organizations sensitive data to the cloud which is storing outside the Australian network. These are all managed by the Office of Australian Information Commissioner(OAIC) which provides oversight on the data privacy regulations designed to govern the dissemination of the sensitive information.

One rule they applied under this is The Australian National Privacy Act 1988 which tells how the organizations collect, use, secure, store the information. The National Privacy Principles in the Act tells how organizations should use the people's personal information. The NPP has a rule that An organization must take the responsibility to hold the information without misuse or modified by unauthorized access. They require enterprises to put security service level agreements with the cloud service providers that define audit rights, data location, access rights when there is cross border disclosure of information.

In later time they introduced a new principle called The Privacy Amendment Act 2012. This principle gives set of new rules along with the changes in the many rules in the previous act and also this is having a set of new principles those are called Australian Privacy Principles (APP).

In this there is principle for cross border disclosure of personal information which is APP8. This rule regulates the disclosure or transfer of personal information by an agency or company to a different location outside the country.

Before disclosure the information outside they have to take responsible steps that the company outside the Australia must not breach the APP 's.

3 0
3 years ago
What is a deny all catch all
a_sh-v [17]

Answer: The default catch-all rules at the end of  are: block in log quick all label "Default block all just to be sure." block out log quick all label .

Explanation:

7 0
3 years ago
What is the purpose of a web server? What is the purpose of a web browser?
Sauron [17]

Answer: the purpose of a web browser is to help answer and needed questions, and to get to sites.

Explanation:

4 0
2 years ago
Why not to use settimeout in angular.
barxatty [35]

Answer:

start with what you know

Explanation:

you can learn alot

4 0
2 years ago
Type you all suck if you want to be my freind
Nina [5.8K]

Answer:

you all suck

Explanation:

;)

4 0
3 years ago
Read 2 more answers
Other questions:
  • It is better to know the main components of all computer programming languages
    9·1 answer
  • Explain the difference between an i/o‐bound process and a cpu‐bound process.
    12·1 answer
  • To find resources on the Internet for your courses, you may need to use a search engine. Suppose that you are collecting informa
    14·1 answer
  • Create a function named first_a that uses a list comprehension. The function will take a single integer parameter n. Find every
    13·1 answer
  • What did Charles Babbage design in 1822 to substitute values in polynomial equations? ENIAC TRADIC Analytical Engine Difference
    6·1 answer
  • Callie Crystal owns and operates one of the most successful local coffee shops in Denver, called The Edgewater Café. Each time a
    5·2 answers
  • What is HTML? (list down any 5 points)
    12·1 answer
  • What is the full form of EPROM (CLASS-6)
    6·2 answers
  • Please explain what steps you will take to prevent hackers from getting access to your personal information.
    7·1 answer
  • You are the security analyst for your organization and have discovered evidence that someone is attempting to brute-force the ro
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!