1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shtirlitz [24]
3 years ago
5

Identify the term that refers to the right to control access to ourselves and to our personal information.

Computers and Technology
1 answer:
g100num [7]3 years ago
7 0

Answer:

Privacy

Explanation:

In the privacy control access mechanism it control the data of the personal information.The model P-RBAC that is the framework of key component that extended the RBAC model that gives the complex  policy of privacy such as obligations.In the P-RBAC we defined the privacy awareness permission.

The privacy control access mechanism giving the right to control the personal information.

You might be interested in
2. The factorial of a positive integer n is the product of the integers from 1 to n. You can express the factorial of a positive
Molodets [167]

Answer:

import java.io.*;

import java.util.Scanner;//importing the scanner.

class Factorial {

public static void main (String[] args) {

    Scanner fact=new Scanner(System.in);//creating a scanner object for taking the input.

    int t,n;//t for number of times the user want to calculate the factorial and n for factorial.

    System.out.println("How many times you want to calculate the factorial");

    t=fact.nextInt();//taking input of t.

    while(t>0)

    {

        int f=1;//f for calculating the variable.

        n=fact.nextInt();//taking input of n .

        if(n>10||n<1)//if n is out of range then again taking input.

        {

           while(n>10 || n<1)

                {

                        System.out.println("Please Enter the Valid Input");

                 n=fact.nextInt();

                }

               for(int i=1;i<=n;i++)//calculating the factorial.

               {

                   f*=i;

               }

               System.out.println("The factorial is: "+ f);

        }

        else // if n is in  range then definitely calculating the factorial.

        {

             for(int i=1;i<=n;i++)// calculating the factorial.

               {

                   f*=i;

               }

               System.out.println("The factorial is: "+ f);

        }

    }

}

}

Output:-

How many times you want to calculate the factorial

2

-5

Please Enter the Valid Input

4

The factorial is: 24

5

The factorial is: 120

Explanation:

The above written code is for calculating the factorial of an integer the number of times user want to calculate the factorial.The code wants user to enter again until the value entered by the user is in range.If the value is in range then it definitely calculates the factorial.

6 0
3 years ago
A human subject’s photographs show two catchlights in each eye that are unwanted by the photographer. What is the most likely ca
Sphinxa [80]
A human subject's photographs show two catchlights in each eye that are unwanted by the photographer. what is the most likely cause of this problem? the fill light is too strong. the main light is too high.
7 0
3 years ago
What are some cloud storage devices?​
ryzh [129]

i believe some are google docs, apple icloud, xdrive, MediaMax, and Strongspace

6 0
3 years ago
Add a function named circle to the polygons module. This function expects the same arguments as the square and hexagon functions
PolarNik [594]

Answer and Explanation:

import Circle

#include<conio.h>

void main ()

int t , length , n

//for hexagon

def hexagon(t, length, n):

 for _ in range(n):

 t.fd(length)

t.lt(360 / n)

square = Circle.Circle()

square.penup()

square.sety(-270)

square.pendown()

hexagon(square, 30, 60)

5 0
3 years ago
__________ loads Windows with a minimum configuration and can create a stable environment when Windows gets corrupted
Tju [1.3M]

Answer: Safe mode loads Windows with a minimum configuration and can create a stable environment when Windows gets corrupted

Explanation:

5 0
3 years ago
Other questions:
  • What was the treaty of the Meter
    13·1 answer
  • Plagiarism occurs when writers
    14·2 answers
  • Which of the following is NOT a recommended characteristic for incident objectives?A. Stated in broad terms to allow for flexibi
    6·1 answer
  • In java, a class that is defined without an explicit extends clause ____.
    15·2 answers
  • Write a loop that displays all possible combinations of two letters where the letters are 'a', or 'b', or 'c', or 'd', or 'e'. T
    10·1 answer
  • Grid computing takes advantage of the available 75% of unused processing power of a computer and links thousands of individual c
    13·1 answer
  • The variables xp and yp have both been declared as pointers to integers, and have been assigned values. Write the code to exchan
    6·1 answer
  • In cell B20, enter a function to calculate the average attendance for 2018
    11·1 answer
  • Will give brainliest!<br> Who created binary, and does anyone have any idea how?
    13·1 answer
  • Which examples demonstrate common qualifications for Marketing Information Management and Research careers? Check all that apply
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!