1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
7

A social media site violates its terms of service by selling information about its users

Computers and Technology
1 answer:
balu736 [363]3 years ago
4 0
A company violating its terms of service by selling their user’s info is a violation of Digital Privacy
You might be interested in
Write the function mystrchr(). the function has two parameters: a const char * s pointing to the first character in a c-style st
GrogVix [38]
<span>c. return a pointer to the first appearance of c appearing inside s and nullptr (0) if c does not appear inside s.</span>
7 0
3 years ago
Write a class named RetailItem that holds data about an item in a retail store. The class should store the following data in att
sp2606 [1]

Answer:

public class Main

{

public static void main(String[] args) {

 

 RetailItem ob1 = new RetailItem("Jacket", 12, 59.95);

 RetailItem ob2 = new RetailItem("Designer Jeans", 40, 34.95);

 RetailItem ob3 = new RetailItem("Shirt", 20, 24.95);

 

}

}

class RetailItem {

   

   private String itemDescription;

   private int units;

   private double price;

   

   public RetailItem(String itemDescription, int units, double price) {

       this.itemDescription = itemDescription;

       this.units = units;

       this.price = price;

   }

}

Explanation:

Create a class called RetailItem that has three variables itemDescription, units, and price

Initialize a constructor that takes three parameters to set the values

Inside the main, create three objects with given data

7 0
3 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
A(n) _____ is a common output device for hard copy.
Sidana [21]
The answer is d it is d it is d I think I think, I’m not sure though
8 0
3 years ago
Ray owns a gaming cafe where users can play video games on computers. These games involve rich graphics and need high processing
tankabanditka [31]

Answer:

thick

Explanation:

i took the test and got it right

6 0
2 years ago
Other questions:
  • Business ethics the intranet is a private piece of a company's internet network that is made available to computers and/or vendo
    11·1 answer
  • The ___ is the primary storage device of a personal computer. hard drive RAM ROM compact disc
    6·1 answer
  • PLEASE HELP!!!!! MUCH OBLIGED!!!!
    15·1 answer
  • Can someone help me to give this guy brainliest the button is not there
    8·1 answer
  • Keyboard question: <br> How do I make the 'congruent to' symbol on this keyboard?
    8·1 answer
  • Which of the following is most likely to be considered plagiarism? Using materials from a source without proper citation. Adding
    5·1 answer
  • We already know that we can create a lunar lander application of the pipe-and-filter architecture style from three independent J
    6·1 answer
  • Jennifer works as a clerk in a company. The essential function of her job is typing on a keyboard. If she develops crippling art
    11·1 answer
  • Questions Presscomion
    9·1 answer
  • a matched-pairs t-test is not an appropriate way to analyze data consisting of which of the following?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!