1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
4 years ago
10

Are there protections for people in terms of what data can be collected by different sites?

Computers and Technology
1 answer:
s2008m [1.1K]4 years ago
8 0
Yes , usually before you sign up for a website or app it will warn you and tell you what the app or website will have access to and what will gained through using the website or app
You might be interested in
Match each operating system drawback to its respective operating system.
Lena [83]

Answer:

Microsoft Windows - More susceptible to viruses

Linux - Limited support system

Apple - Fewer compatible applications

Explanation:

Generally windows is more susceptible to viruses.

Linux is open source meaning it's up to the community to help you.

Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.

4 0
3 years ago
Read 2 more answers
Sandy Fiero works as the Chief Knowledge Officer for Bend Lumbar Company. She has been given the responsibility to create a prod
cestrela7 [59]

Answer:

a. The primary value activity outbound logistics.

Explanation:

"Outbound logistics can be defined as the process of storing, transportation and distribution of goods to customers."

The  process begins from a customer sales order, moves to a warehouse packing and completes upon the delivery of product. To ensure smooth running of outbound logistics, businesses must choose the right channels of distribution, maintain a sensible stock of inventory and optimize their delivery options.

In the given scenario, as Sandy is removing shipping cost under specific conditions, she is adding value on distribution process. Hence Option a. is correct.

3 0
3 years ago
When an attacker attempts to gain access to a user's computer by stealing the encrypted file containing the password hash that w
-Dominant- [34]
Correct answer: Offline cracking

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach (brute-force attack) is to try guesses repeatedly for the password and check them against an available cryptographic hash of the password.

The purpose of password cracking might be to help a user recover a forgotten password (installing an entirely new password is less of a security risk, but it involves System Administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords. On a file-by-file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file's access is restricted.

5 0
4 years ago
Which of the following makes miscommunication more likely in e-mail?
vichka [17]

Answer:

all of the above

Explanation:

mark brainlist

3 0
4 years ago
What are two options available for highlighting changes in the Highlight Changes dialog box?
lukranit [14]

Answer: D

Within a specific time period or by a specific user

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • In an email, above subject, what does cc mean?
    13·1 answer
  • The _____ stage of information technology planning outlines business processes that are central to achieving strategic goals and
    10·1 answer
  • Mobile Device Company (MDC) discovers that defamatory statements about its policies and products are being posted in an online f
    8·1 answer
  • ___________ is the ability of a product to satisfy a customer.
    11·1 answer
  • Why do we have to watch a video to get answers?
    7·2 answers
  • What is the output?<br> answer = "Hi mom"<br> print(answer.lower())
    7·1 answer
  • Information has just been sent from a Web form on a client's system to a Web server. Which of the following is required to proce
    14·1 answer
  • The ____ attribute can be used only with input boxes that store text. Group of answer choices type pattern required value
    9·1 answer
  • In the program evaluation and review technique (PERT), a delay in ________ will cause the entire project to fall behind. Multipl
    7·1 answer
  • True or False? Any edition or version of Windows can join a domain.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!