1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
12

What is the difference between deta security and privecy ?

Computers and Technology
2 answers:
Lunna [17]3 years ago
5 0

The Difference Between Data Privacy and Data Security. Although data privacy and data security are often used as synonyms, they share more of a symbiotic type of relationship. Just as a home security system protects the privacy and integrity of a household, a data security policy is put in place to ensure data privacy.

Arada [10]3 years ago
5 0
Security is about the technical measures you take to prevent data falling in the wrong hands (e.g., make your system hacker proof). Privacy is about deciding who is allowed to see what.

So, without proper security, your privacy may be at risk. The other way around, even with super security, privacy can be at risk if too much data is deliberately shared.
You might be interested in
What is the difference, if any, between a Portable Media Player (PMP) and a Digital Media Device (DMD)? PMPs can be analog or di
lara [203]

Answer:

PMPs are typically referred to interchangeably.

Explanation:

3 0
3 years ago
Alice and Bob are unknown to each other. Alice wants to send an encrypted message to Bob. So it chooses a KDC which is known to
kakasveta [241]

3. ¿Qué mensaje recupera Bob después del descifrado? Mostrar como caracteres hexadecimales.

Respuesta: la clave con el mensaje :

5 0
3 years ago
A firm has a huge amount of individual customer data saved in different databases. Which of the following can be used to integra
Rama09 [41]

Answer:

C. CMR systems

Explanation:

CMR or customer relationship management is a strategy that uses data analysis of customers to manage the interaction between a company and current and potential customers.

It analyses the data of client from different channels like wesites, email, social media,telephone log etc, describing and predicting potential decisions to be made to enhance customer service and acquisition.

6 0
3 years ago
Orphan record example?
Goryan [66]

Answer:

If we delete record number 15 in a primary table, but there's still a related table with the value of 15, we end up with an orphaned record. Here, the related table contains a foreign key value that doesn't exist in the primary key field of the primary table. This has resulted in an “orphaned record”.

4 0
3 years ago
TO COMPUTING IN BUSINE
Diano4ka-milaya [45]

Answer:

<em>the</em><em> </em><em>correct</em><em> </em><em>answer</em><em> </em><em>is</em><em> </em><em>a.</em><em> </em><em>Word</em><em> </em><em>processing</em><em>.</em>

Explanation:

<em><u>hope</u></em><em><u> </u></em><em><u>this</u></em><em><u> </u></em><em><u>works</u></em><em><u> </u></em><em><u>out</u></em><em><u>!</u></em><em><u>!</u></em><em><u>!</u></em><em><u>!</u></em><em><u>!</u></em>

5 0
4 years ago
Other questions:
  • What group actively creates technology recommendation for the web?
    8·2 answers
  • ________ gives its approval to U.S. e-commerce websites that follow strict privacy standards, such as explaining to visitors how
    6·1 answer
  • Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alpha
    7·1 answer
  • Why would Network Systems employees be employed by the government?
    12·2 answers
  • ¿En cuales situaciones concretas se puede aplicar las técnicas de conteo(particularmente las permutuaciones y las combinaciones)
    11·1 answer
  • When creating envelopes, how will you adjust the layout?
    10·2 answers
  • Learning how to use software takes time. So, after customers have learned to use a particular software package, it is easier to
    11·1 answer
  • What does considering scale mean in science?
    15·1 answer
  • You wrote a program to find the factorial of a number. In mathematics, the factorial operation is used for positive integers and
    14·2 answers
  • Play station account
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!