1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinil7 [7]
3 years ago
15

Please someone helppppppp

Computers and Technology
2 answers:
kicyunya [14]3 years ago
7 0

Answer:

COMMUNICATE WITH THE COSTUMERS

Cerrena [4.2K]3 years ago
5 0

Answer : communicate is the answer.

You might be interested in
Your boss asks you to transmit a small file that includes sensitive personnel data to a server on the network. the server is run
polet [3.4K]
If an attacker can see transmitted packets, they will be able to see login credentials and be able to log in to the server. Additionally, the sensitive data in the file will be visible to the attacker. A better way would be to transfer the file using sftp or tftp.
4 0
3 years ago
The management of Ventura Inc. approves the purchase of a few computers for the sales team. The management wants only the most b
BaLLatris [955]

Answer:

Ventura Inc requires only System software's

Explanation:

The system software has three major functions which are:

1. File and disk management: this involve managing of files in the system, when user want to save, move, copy, delete and rename files, The system software will handle those task

2. Allocating system resources: The system resources such as time, memory, data input and output are  allocated by the system software. The main memory is managed by the system software to avoid conflict among various task.

3. Monitoring system activities:  The system security and system performance is also monitored by the system software.

The first two functionalities are the requirement of ventura inc  

8 0
3 years ago
As designs incorporate new technologies, it can seem like an actor is walking through a projection or even become part of a proj
katovenus [111]

Answer:

The answer to the given question is "True".

Explanation:

In computer science, Design is an oriented programming language, that includes text, graphics, style elements, etc.  It is used to convert the projection into 3D to 2D which means a three-dimensional to two-dimensional object and uses to display the improve projection.

That's why the answer to this question is "True".    

4 0
3 years ago
In what country have regulators demanded that facebook stop collecting biometric data on its users?
Helga [31]
America or Australia
6 0
4 years ago
Provide an example by creating a short story or explanation of an instance where confidentiality would be broken.​
Reil [10]

Explanation:

Personal Insurance

Confidentiality in the workplace: What you need to know

When you give advice to clients or patients for a living, you'll know that protecting sensitive and personal information is crucial. But are you clear on what counts as a breach of confidence or what to do if one occurs?

From how to protect confidential information, to what breaches of confidence look like for different jobs, here's what you need to know about confidentiality in the workplace.

What is a breach of confidentiality?

In short, a confidentiality breach is the disclosure of information to someone without the consent of the person who owns it. In other words, failing to respect a person's privacy or the confidence in which they gave the information or data to you, by passing it onto someone else.

Why is confidentiality important?

Protecting confidential information is vital. If you're in a position where you have access to or are given this type of data at work, your career relies on your ability to keep patient or client confidentiality. If you don't, you could lose trust and integrity in the eyes of your existing (and potential future) clients, who could terminate your contract and take legal action against you.

Therapist/patient confidentiality

Unsurprisingly, patient confidentiality is highly important for therapists and counsellors. It forms part of the therapeutic frame of appropriate boundaries, which creates a safe space for a good working relationship to form.

Here’re some examples of ways you could unintentionally break patient/therapist confidentiality:

Sharing confidential information about a client with a family member or friend

Talking about confidential information somewhere you can be overheard

Leaving your computer containing confidential information open to others

Continuing to work with a client when there's a conflict of interests (for example, they know one of your family members or friends)

When permission to share information is given but isn't specific, this can create confusion and result in a potential breach (for example, a patient may give permission for their information to be shared with a teacher but not their GP)

7 0
4 years ago
Other questions:
  • Is the protocol that specifies how web browsers and servers communicate.?
    11·1 answer
  • Can I change my brainly username?
    9·2 answers
  • Which of the following lists contains the five essential elements of a computer?
    5·1 answer
  • The keyboard preferences pane includes a list of keyboard shortcuts.
    8·1 answer
  • Discuss some design considerations that you should keep in mind when you want to design a professional-looking flyer or newslett
    5·2 answers
  • Does anyone know the answer to this question
    9·1 answer
  • Here it is crews my profile pic
    5·2 answers
  • The advantage of an electronic ____ is that the content can be easily edited and updated to reflect changing financial condition
    8·1 answer
  • _____________ helps to control and limit the number of consecutive request failures that cross a threshold. Review breaker Micro
    7·1 answer
  • What stage in the process of media production involves discussing the budget and timelines as well as identifying stakeholders?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!