1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
12

What is the difference between deta security and privecy ?

Computers and Technology
2 answers:
Lunna [17]3 years ago
5 0

The Difference Between Data Privacy and Data Security. Although data privacy and data security are often used as synonyms, they share more of a symbiotic type of relationship. Just as a home security system protects the privacy and integrity of a household, a data security policy is put in place to ensure data privacy.

Arada [10]3 years ago
5 0
Security is about the technical measures you take to prevent data falling in the wrong hands (e.g., make your system hacker proof). Privacy is about deciding who is allowed to see what.

So, without proper security, your privacy may be at risk. The other way around, even with super security, privacy can be at risk if too much data is deliberately shared.
You might be interested in
What is the purpose of using variables in programming?
Sedbober [7]
Variables are used to store information to be referenced and manipulated in a computer program. ... It is helpful to think of variables as containers that hold information. Their sole purpose is to label and store data in memory. This data can then be used throughout your program.
6 0
3 years ago
HELP PLEASE
GREYUIT [131]

Answer:

D, storyboard

Explanation:

5 0
3 years ago
Is the computer a device that calculates and has the independence and initiative for the actions it performs?
inna [77]

Answer:

The answer is "True".

Explanation:

In this question, the given statement is true because the computer is a device that receives information as input, analyzes information utilizing a program that provides relevant information for the processed data, and in this, it performs numerous calculation and all the calculation will be store in its memory, which is used in the future for collect data on hard drives.

8 0
3 years ago
A chart that shows the resource (project team member) along with their allocated hours for each week is known as a(n):
Anon25 [30]

Answer: b) GNATT chart

Explanation: GNATT is the type of chart that displays the schedule or working in the form of bars in horizontal direction .The chart displays the duties /task performed on the vertical axis and the time periods on horizontal axis week-vise. This chart is usually used for project management purpose fr coordination, tracing, planning etc.

Other options are incorrect because project staffing chart is for the display of the staff activities involved during project, histogram is graph representation using bars of different heights and entity diagram displays the entities relation in databases..Thus , the correct option is option(b).

4 0
3 years ago
A type of address translation in which a gateway has a pool of public ip addresses that it is free to assign to a local host whe
krok68 [10]
<span>Dynamic Network Address Translation (DNAT)</span>
7 0
3 years ago
Other questions:
  • Where are Micro USB connectors used the most?
    11·2 answers
  • You want to enable nap so that all portal computers using wireless connections have an active firewall. which type of enforcemen
    11·1 answer
  • Hey I don’t have a question I’m just testing something on this app
    6·2 answers
  • Write a program "addnumbers.c" where it takes as many arguments as the user includes as command line arguments and calculates th
    11·1 answer
  • In which circumstances would the view side by side feature be useful or helpful.
    15·2 answers
  • The I/O modules take care of data movement between main memory and a particular device interface.A. TrueB. False
    9·1 answer
  • The purpose of Appetizers on the menu​
    6·2 answers
  • What are the steps in preparing a bootable USB installer?​
    11·1 answer
  • 9.
    8·1 answer
  • Why do Linux administrators prefer to give sudo access to application teams instead of letting them su to root?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!