privacy principles need to be balanced against the ___ benefit that comes from the automated collection of private information. select 2 options.

corporate
political
ethical
societal
financial​

Answers

Answer 1

The privacy principles need to be balanced against the corporate

the political benefit that comes from the automated collection of private information.

What is the privateness coverage of the employer?

A privateness coverage is a file that explains how an employer handles any consumer, consumer or worker records accumulated in its operations. Most websites make their privacy guidelines to be had to web website online visitors.

The greater glad clients are, the longer they live with a business enterprise and offer sufficient enterprise to make certain increase and profitability. While setting collectively techniques for higher consumer service, a business enterprise ought to make certain that the stability among consumer expectancies and enterprise desires is maintained sustainably.

Read more about the information:

https://brainly.com/question/25689052

#SPJ1


Related Questions

A computer is the __________ of an attack when it is used to conduct an attack against another computer.

Answers

Answer:

A computer is the __________ of an attack when it is used to conduct an attack against another computer.

Answer: Subject

Explanation:

What happens when you restrict someone on messenger?.

Answers

Answer:

You won't get any notifications from the person that's restricted, via messages, videos, or images. If the restricted person tries calling you, your phone won't ring.

The hard disk that is mounted inside the system unit sometimes is called a(n) ____________________ disk because it is not portable.

Answers

Answer:

Permadisk

Explanation:

Write a one register parameter procedure that converts an ASCII digit in AL to its corresponding binary value. If AL already contains a binary value (00h to 09h), then leave AL unchanged. In either case the procedure clears the zero flag. If the value in AL is neither an ASCII digit nor a binary digit then the procedure sets the zero flag.Write a program to test the procedure.

Answers

Using the parameter to convert a digital ASCII code into AL we have that it will be necessary to recognize this code and the input values, in this way:

Writing this code, we have:

data segment

”ENTER ANY VALUE”

start:

movah,9

int21h

movah,4ch

int21h

movah,1

subal,30h

endstart

In this case the values ​​that must be put in this code are:

enter any ASCII value will be 5

See more about ASCII at brainly.com/question/17147612

#SPJ4

How do milestones help a project manager ensure that a project goes smoothly?

A. By showing whether the project is progressing as planned

B. By showing whether the project is being monitored appropriately

C. By indicating whether the right team members have been given the right tasks

D. By indicating whether the project plan needs to be changed

Answers

Answer:

kung pwede lang sana none of the above

Explanation:

good evening po

jk lng po

By showing whether the project is progressing as planned. The correct option is A.

What are Milestones?

Milestones are specific points in time within a project that represent significant accomplishments or completion stages.

They assist a project manager in ensuring the smooth running of a project by providing a means to measure progress and monitor the overall health of the project.

Milestones also help team members stay focused on the project's goals and objectives, as well as provide a sense of accomplishment as each milestone is reached.

While monitoring and appropriate task assignments are important for project success, they are not the primary ways in which milestones assist a project manager in ensuring the smooth running of a project.

Likewise, while milestones may indicate the need for changes to the project plan, their primary purpose is to track progress and identify potential issues, rather than to indicate a completion date.

Thus, the correct option is A.

For more details regarding milestones, visit:

https://brainly.com/question/15843795

#SPJ7

A user in a small office environment explains to you that his office implements a small Microsoft workgroup. Users commonly share folders with each other. Which access control model is represented in this example

Answers

65 DAC is the access control model is represented in the example where a user explains to you that his office implements a small Microsoft workgroup.

What is DAC?

DAC is a Microsoft dynamic access control is a tool for governing data in Windows server 2012. It helps in administering the access control settings of the device.

Thus, 65 DAC is the model that is used to represent the example in which a user explains to you that his office implements a small Microsoft workgroup.

Learn more about DAC

https://brainly.com/question/20216206

#SPJ1

What type of computer should you consider purchasing if you want a portable system that is good for students and on-the-go professionals who want to create content and be productive, in addition to consuming content

Answers

Answer:

laptop

Explanation:

,.....................

A friend of Alex has gifted a movie collection, and Alex is excited to watch them all as quickly as possible. The duration of the movies is given in array durations[n], where n is the number of movies, and each movie duration lies between 1.01 and 3.00 units of time (up to two decimal places). Every day, Alex wants to spend no more than 3.00 units of time watching the movies but also wants to complete the movies in the least number of days possible. Alex does not leave a movie in between. That is, if Alex has picked up a movie, Alex watches the complete movie on the same day. Find the minimum number of days needed to watch all the movies.

Answers

To find out the duration of alex's movies, you can use the code in C++ to make this calculation, where you will only need the number of movies and their duration, as well:

Writing code in C++:

#include<bits/stdc++.h>

using namespace std;

struct Movie {

  int timeBegin, duration, timeEnd;

  bool operator<(const Movie& another) const {

     return timeEnd < another.timeEnd;

  }

};

struct Festival {

  int count;

  vector<Movie> movies;

};

Festival* initialize(int timeBegin[], int duration[], int count) {

  Festival* filmFestival = new Festival;

  filmFestival->count = count;

  for (int i = 0; i < count; i++) {

     Movie temp;

     temp.timeBegin = timeBegin[i];

     temp.duration = duration[i];

     temp.timeEnd = timeBegin[i] + duration[i];

     filmFestival->movies.push_back(temp);

  }

  return filmFestival;

}

int solve(Festival* fest) {

  int res = 0;

  sort(fest->movies.begin(), fest->movies.end());

  int timeEnd = -1;

  for (int i = 0; i < fest->count; i++) {

     if (fest->movies[i].timeBegin >= timeEnd) {

        res++;

           timeEnd = fest->movies[i].timeEnd;

     }

  }

  return res;

}

int main(int argc, char *argv[]) {

int timeBegin[] = {1, 3, 0, 5, 5, 8, 8};

int duration[] = {3, 2, 2, 4, 3, 2, 3};

Festival * fest;

fest = initialize(timeBegin,duration, 7);

cout << solve(fest) << endl;

return 0;

}

See more about C Code at brainly.com/question/17544466

#SPJ1

Which statement best describes the Tell Me feature in PowerPoint 2016?
OIt is primarily used to locate options in the menu.
OIt provides detailed information about particular tasks within the program.
O It automatically sets up new slide templates that are commonly used.
O It opens a search field that can be used to look up old versions of presentations.

Answers

A statement best describes the Tell Me feature in PowerPoint 2016 is that: D. it opens a search field that can be used to look up old versions of presentations.

What is PowerPoint 2016?

PowerPoint 2016 refers to a software application that was designed and developed by Microsoft Inc., so as to avail its end users the ability to create various slides which can be used during a presentation.

In PowerPoint 2016, the Tell Me feature is a tool which opens a search field that can be used by end users to look up or search old versions of presentations.

Read more on PowerPoint here: https://brainly.com/question/26404012

#SPJ1

What does playstation network is currently undergoing maintenance?.

Answers

Answer:

it means it's being fixed and you need to wait till its done

Explanation:

Hope this helps

Pedro has written a program in a high-level language to do some calculations for a friend. His friend needs to use the program immediately on his laptop. Pedro does not know what software is available on the laptop. Also, his friend's internet connection is very slow. Explain which type of translator Pedro should use for his program. Give reasons why this is the best choice in this case.​

Answers

In the case above, a Compilers is the best translator for a program that is said to be changed or written in a high-level language into machine code.

Why do you need to translate a program written in a high-level language into machine language?

Programming languages are known to be easy for humans to read and understand.

Note that The program (source code) need to be translated into machine language so that the computer can be able to carryout the program.

Therefore, In the case above, a Compilers is the best translator for a program that is said to be changed or written in a high-level language into machine code.

Learn more about machine language from

https://brainly.com/question/23275071

#SPJ1

The function ____ can check whether an expression meets the required conditions; if the conditions are not met, it terminates the program.

Answers

Answer:

assert()

Explanation:

The assert function takes a boolean as an input, and when true, it just continues the flow, however if false it prints an error and calls exit.

Which example best demonstrates an impact of computers on the economy?

Answers

Due to the student bulling another student on social media. social media has to do with computing

Explanation:

bad eyesight

students distraction

lack of concentration

For this step, submit your work in the programming environment by running your code, checking your code for a score. The score you get will show a percentage - this is a percentage of the 10 possible points. For example, if you check your code and earn a 50%, this means you have earned 5 out of 10 points. You can check your code more than once, until you earn a score you are happy with.

You must include all of the following requirements in your webpage to earn full points:

A page title
At least three headers (h1, h2, etc)
Paragraph tags
Font styles (for example, using to change the font's color)
At least two images (see below for more information about images)
At least one link to another website
One email link
A background, using either of the following techniques:
Inserting a background image (does not count as one of the two images above)
Changing the background color (using the tag)
Once you complete the steps on this page, proceed to Step 2 on the next page. You must complete both steps to complete this unit's assignment.

Answers

A sample HTML code that contains headers, paragraph tags, hyperlinks is

<h1> This is a header </h1><h2> This is a subtitle heading </h2><p> This is a paragraph </p><a href=”www.brainly.com”> Brainly Website </a>

What is HTML?

This is the building block of a website and is an acronym that means Hypertext Markup Language.

The HTML code that can be used to add a sample image is: "<img src="pic_Brainly.jpeg" alt="Brainly" width="500" height="333">

The src code means the specific location of the external resource

The width and height show how tall and wide the image would be.

The alt shows the alternative information for the image that can be seen when a person hovers over the image on the website.

Read more about HTML and CSS here:

https://brainly.com/question/24051672

#SPJ1

Which is a best practice that can prevent viruses and other malicious code from being downloaded.

Answers

A best practice that can prevent viruses from being downloaded is by not clicking on links in graphic email messages

How to prevent virus or malicious codes?

Virus and malicious codes can be installed on a computer through several ways, which include:

Not using an antivirus on the computerClicking on untrusted links in graphic email messagesInsecure downloads

The above can be prevented by

Installing a genuine antivirusNot clicking on trusted linksAccessing sites with secured downloads

Read more about virus at:

https://brainly.com/question/12543839

#SPJ1

Advantages & Disadvantages of flow chart​

Answers

Answer:

Advantages of flow charts:

1. Communication where flowcharts are a more effective technique of explaining a system's rationale to all parties involved.

2. Efficient interpretation by using a flowchart, a problem can be investigated more effectively, resulting in lower costs and less time wasted.

3. Appropriate documentation such when program flowcharts serve as good documentary evidence, that is required for a variety of objectives, allowing things to run more smoothly.

4. Effective Coding where during the systems analysis and software development phases, the flowcharts serve as a guide or blueprint.

5. Practical Debug where the flowchart assists with the debugging process.

6. Efficient Program Maintenance by using a flowchart, it is simple to maintain an operational program. It allows the programmer to focus his efforts more effectively on that section.

Disadvantages of flow charts:

1. Manual traceability is required to ensure the accuracy of the flowchart drawn on paper.

2. Simple changes to the problem reasoning may necessitate a complete redo of the flowchart.

3. Displaying many branches and looping in flowchart is challenging.

4. When dealing with a complicated project or algorithm, the flowchart becomes very challenging and imprecise.

5. It can take some time to modify a flowchart.

The process of copying and storing data,files,progrms,etc.from internet server to user's computer is know as ..........

Please help me ​

Answers

(Storage) i think…okay

Fifteen years ago, everyone didn't have a cell phone. Anyone developing an app would not have found many users. Today, the existence of mobile apps is one of the reasons why smartphones are so popular today. These apps make phones and tablets smart, in terms of functionality and features. The app market is seeing hundreds of new applications introduced every day. This example shows that _______.

Answers

Answer:

Are there any options?

Explanation:

The world is frequently coming in with better and more advanced technologies. More people are entering the digital world every day. The pace at which disruptive technologies are arriving is accelerating – and they’re changing how we live. The same technologies are giving rise to new business models. Example of development in the past 15 years- A.I.

The technique that allows you to have multiple logical lans operating on the same physical equipment is known as a.

Answers

Answer:

As far as i know, it is Virtual Local Area Network (VLAN). You can read more about this here: https://en.wikipedia.org/wiki/VLAN

The _____ _____ form of database attack injects code into user login information with one or more statements that perform actions on the database.

Answers

Answer:

The answer is cross-site scripting(XSS)attack.

Explanation:

Hope this helps!

The cross-site scripting (XSS) attack form of database attack injects code into user login information with one or more statements that perform actions on the database.

What is cross-site scripting (XSS)?

Cross-site scripting (XSS) attacks insert a malicious executable script into the source code of a trustworthy program or website. Attackers frequently give users a malicious link to click on in order to launch an XSS attack.

Cross-site scripting can be broadly classified into three types: stored, reflected, and DOM-based XSS. When a third-party web application is loaded from an unrelated attack site in a way that makes it execute a JavaScript segment that has been prepared by the attacker in the security context of the targeted domain by using a reflected or non-reflected.

Thus, it is cross-site scripting (XSS) attack.

For more information about cross-site scripting (XSS) attack, click here:

https://brainly.com/question/26706948

#SPJ5

You saved your style options as "webstyle.css" in a subfolder called "styles."

what line do you include in the head section of your html file to use your styles?







Answers

A line which should be included in the head section of a html file to use these styles is link rel="stylesheet" type="text/css" href="styles/webstyle.css"

What is HTML?

HTML is an abbreviation for hypertext markup language and it can be defined as a standard programming language that is used for designing, developing and creating websites or webpages.

In Cascaded style sheet (CSS), a line which should be included in the head section of a html file to use these styles is given by:

link rel="stylesheet" type="text/css" href="styles/webstyle.css"

Read more on HTML here: https://brainly.com/question/4056554

#SPJ1

Type the correct answer in the box. Spell all words correctly.
What text results in variable whitespace?
[blank] text results in variable whitespace

Answers

The option that explains the term above is that Fully justified text results in variable whitespace.

What is meant by whitespace?

The Definition of the term white space is known to be the areas or parts of a page that do not have print or pictures.

Therefore, we can say that The option that explains the term above is that Fully justified text results in variable whitespace.

Learn more about whitespace from

https://brainly.com/question/11902037

#SPJ1

Why is it important for companies to invest in building a complete data and analytics platform?.

Answers

Companies need to invest in data and analytics platform as it  generates insights by housing data in one place and converting it into easily consumable information at high speed.

Why is it vital to use the analytics of a platform?

Analytics platforms is known to have helped a lot of data scientists as it has help to boast access to a lot of data sources and hardware.

Note that Companies need to invest in data and analytics platform as it  generates insights by housing data in one place and converting it into easily consumable information at high speed.

See options below

It produces cultural support and alignment, a growth mindset, and new ideas and priorities to improve business processes.

It creates awareness of what data can do to improve business processes.

It generates insights by housing data in one place and converting it into easily consumable information at high speed.

It stores large amounts of data that are easily retrievable for future business growth.

Learn more about analytics platform from

https://brainly.com/question/26468036

#SPJ1

The direction of a ratchet is reversed by _______________________.

Answers

Answer:

You can reverse the direction of a ratchet by hitting with an equal or higher amount of force it came at you with.

Explanation:

C provides a data structure, the ___________, which stores a fixed-size sequential collection of elements of the same type.

Answers

Answer:

Array

Explanation:

The array is a data structure in C that can hold a predefined quantity of the same type of element in an ordered fashion, and can be defined with the following syntax: type name[amount] = {elements}; where type is the type (like int), amount is the capacity it should be defined at, name is what you want to name the array, and elements are a comma separated list of elements to initialize the array with. You can also change the values of elements by using this syntax: name[index] = newelement; where index is which index to change, and new element is what to set it to.

Which are ways that technology keeps you hooked?

Answers

Answer:

you get games, apps, siri, g oog le and different things like phones, tablets, comuptures

Explanation:

84.6% complete question a network administrator is installing a device that uses redundant array of independent disks (raid) technologies for redundancy and provides employees remote access so that files can be accessed anywhere. the device does not require licensing and stores data at the file level. which device is the employee likely installing in the infrastructure

Answers

The device that this network administrator is most likely installing in the infrastructure is a Network Attached Storage (NAS).

What is a Network Attached Storage (NAS)?

A Network Attached Storage (NAS) can be defined as a file-dedicated storage device that is designed and developed to enable multiple end users and other heterogeneous client devices to store, share and retrieve data anywhere from a centralized disk, especially through a network.

In this context, we can infer and logically conclude that a Network Attached Storage (NAS) is the device that this network administrator is most likely installing in the infrastructure because it doesn't require licensing and the data stored on it at the file level can be accessed anywhere.

Read more on Network Attached Storage here: https://brainly.com/question/14456295

#SPJ1

Which statement best describes one reason why assembly
language is easier to use than machine language?
O A. It allows programmers to easily calculate prime numbers.
O B. It uses the simplest form of code, also known as binary
code.
O c. It is the best way to tell a computer to complete a
single task.
O D. It allows programmers to write abbreviations instead of
repeating calculations

Answers

Answer:

D. It allows programmers to write abbreviations instead of repeating calculations

What is the acronym of COMPUTER​

Answers

Answer:

See Explanation

Explanation:

Computer is not an acronym, it is a word derived from a word "compute" which means to calculate. So, in simple words you can say that computer is an electronic device which is used for fast calculation.

A network administrator has asked robin, a network engineer, to use ospf (open shortest path first) along with rip (routing information protocol) on an edge router in a network so that it demands more memory and cpu power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. identify and analyze which characteristic of ospf signifies this.

Answers

The option that can be used to  identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.

What is OSPF about?

The OSPF is known to be called an open Shortest Path First protocol.

It belongs to the family of IP Routing protocols as it serves as  Interior Gateway Protocol (IGP) used mainly for the Internet, and the option that can be used to  identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.

See full question below

A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this.

Shared data

Low overhead, fast convergence

Stability

Multi-vendor routers

Learn more about OSPF  from

https://brainly.com/question/14604232

#SPJ1

Other Questions
Which sentence states a valid theme of this story?If you don't want to go to prison, don't commit a crime.Beneath the surface, there is no difference between criminals and law enforcement.Even criminals deserve some kindness from others.People will do anything to avoid taking their punishment.Question 2Part BHow does the marshal's (the glum-faced man's) behavior help express the theme stated in Part A?The marshal lets Easton get up from the seat and move around.To help Easton avoid an awkward encounter, the marshal pretends that he, himself, is the prisoner.The marshal promises Easton that he will write a letter to the warden on Easton's behalf.The marshal is polite to Miss Fairchild, treating her like a lady. The use of the epic simile in this excerpt helps the reader understand that the Cyclops only has one eye.how brutal Odysseus and his men are.the size of the wooden spear.how hot the spear actually what are the impact of the religion conflict in the pacific What power did the Articles of Confederation give the U.S. nationalgovernment? The power to create a system of national courtsThe power to force states to obey national lawsThe power to make treaties with other countriesThe power to collect taxes from the state Write the slope-intercept form of the equation of the line through the given points.through: (0, 2) and (-1,-5) a bicycle wheel has a diameter of 65cm what is the length of 1000 revolutions of the wheel in metres On 10/10 when looking for pre-approval on a car loan you should... look for the lowest interest rates you can find. get a loan from the car dealer directly to keep things simple. compare pre-approval offers and select the one that is best for you. select the loan that has the longest repayment period. This table shows some values of an exponential function.What is the function? The large rectangle shown here is 3cm by 5 cm. What is a direct way to determine the area of the rectangle in square centimeters that relies on the meaning of area? state any two organization that address xenophobia The attitudes and beliefs we have about ourselves and others are a direct result of things we learned from our parents or parental substitutes. the willingness to question and challenge the _______ we have internalized is one of the hallmarks of maturity. El nmero equivalente de 25/50 por favor -2h - 8 = 4h - 3(2h + 12) how to solve for x: How many modes does the following data set have?2, 2, 3, 3, 3, 4, 4, 4, 4, 11, 11, 11, 25, 25, 25, 25, 26, 26, 26A. 2B. 6C. 4D. 1SUBT 20The table represents the population, P(x), of a community x years from 2000.0X1235P(x)15,000 15,224 15,316 15,387 15,447 15,500What does the y-intercept represent?OA. the population of the community in 2005OB. the population of the community in 2000OC. the rate at which the population of the community is growingO D. the number of years it takes for the population to reach zeroG Fill in the blank with the correct form of the present perfect tense. los hombres ____________________ por muchas horas en el mar. han pescado hayan pescado tienen pescado han pescando Help! I need the explanation if the answer is 72!!! Which of the following is NOT an adaptationthat bacteria have evolved to surviveantibiotics?A. They recognize when antibiotics enter the body and go dormantto evade being attacked.B. They have alternate ribosomal sites for protein synthesis.C. They have become completely immune to the antibiotics. The scatter plot below represents the weight of a bunch ofbananas based on the number of bananas in the bunch. Atrend line shows the relationship.About how many pounds does the trend line predict that a bunch with 9 bananas will weight?A. 3.0B 4.0C 3.5D 4.5