Betty set up an account on a popular social networking website. She wants to know whether the privacy policy is effective for her account. Which information should she look for in this document?

Answers

Answer 1

the info needed to log in

-This would show what is protected in the privacy policy and its related to you since it would show personal data.

-A good Privacy Policy depends on understanding these matters - showing that this is not an agreement to take for granted.


Related Questions

cui documents must be reviewed to which procedures before destruction?

Answers

Answer:

Documents containing CUI must be destroyed by shredding..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

The procedure before the destruction of the CUI document will be Records Management.

What is the CUI documents procedure?

Any CUI must go through the Records Management processes before it may be deleted. It must be determined if it is transient or persistent and then treated accordingly. Agencies are required to destroy CUI in a way that makes it unrecoverable, unreadable, and indecipherable, even when information is in electronic form.

Agencies are required to apply the procedure specified by law, legislation, or government-wide policy when destroying records. Cross-cut shredding that results in particles that are 1 mm x 5 mm (or less) in size or crushing are two techniques that have been authorized for eliminating paper-based CUI.

To acquire regulatory advice for records management and destruction processes, go to the course resources.

The CUI document must be reviewed to which procedures before destruction by Records Management.

More about the CUI documents procedure link is given below.

https://brainly.com/question/29871876

#SPJ12

unable to find valid certification path to requested target

Answers

Answer:

Explanation:

This issue might arise if you are using a self-signed certificate or a certificate that's been issued by an internal certificate authority, or if your clients (e.g., browser, Java) are outdated. Trust is handled by having the root and intermediate certificates of your SSL certificate on a trusted keystore.

what level of system and network is required for cui

Answers

Answer:

CUI will be classified at a “moderate” confidentiality level and follow DoDI 8500.01 and 8510.01 in all DOD systems. Non-DoD systems must provide adequate security with requirements incorporated into all legal documents with non-DoD entities following DoDI 8582.01 guideline

Explanation:

How can we repair a head jack of a laptop charger.????​

Answers

Answer:

Step one turn off the laptop. And take out the battery step two remove the Phillips screw. And then take out the back. Cover. Step three remove four phillips screws. And then take out the hard.

Explanation:

Difference between batabse and database management system

Answers

Answer:A database is an organized collection of structured information, or data, typically stored electronically in a computer system. A database is usually controlled by a database management system (DBMS). ... The data can then be easily accessed, managed, modified, updated, controlled, and organized.

Explanation:A database could be grades that students get at school and to manage it we can use a spreadsheet program like excel

what are the unique ICT needs for casinos?

Answers

Answer:

This is one of those slot game developers that not only create games, but it also creates entire platforms for online casinos and they have to pay for the games.

Explanation:

where should the works cited page appear in the document?

Answers

Answer:

The Works Cited Page should be the last page of the documents (and it should be a separate page on its own, not just at the bottom of the essay).

_____ selling is used when a product is sold from one business to another .

Answers

Answer: cross-selling

Explanation: is the action or practice of selling an additional product or service to an existing customer. In practice, businesses define cross-selling in many different ways.

search engines use software that combs the web to find webpages and add new data about them to the database. what is this software called?

Answers

Answer:

They basically use a technology called spider or web crawling, it basically just comb through the internet to find websites or webpages.

please give brainliest.

Why would you browse by entering a URL rather than use a link in a Web page

Answers

Answer:

Rather than entering a URL in a web browser, I prefer to browse the webpage. Because if you do browse in the browser you can see other alternative options to that website.

what sort of software programs are used to determine are of origin

Answers

Answer:

Explanation: Tools used to determine area of convergence and area of origin include: Elastic strings and protractors. Mathematical equations - (tangent trigonometric function) Computer software programs such as BackTrack™ or Hemospat.

only cool people answer this question.




are you cool?

Answers

Answer:

Yes

Explanation:

I like frogs

Answer:

always been coolswag

Please need help!!!!!

Which one of these statements regarding the phases of development is true?

A.
The pre-production phase starts after the prototype phase.
B.
The beta phase starts after the alpha phase.
C.
The alpha phase starts after the gold phase.
D.
The concept phase starts after the pre-production phase.
E.
The production phase starts after the beta phase.

Answers

Answer:

Try the answe D because before you start you will need a concept.

It should be noted that the statements regarding the phases of development is true is D; The concept phase starts after the pre-production phase.

According to the given question, we are to discuss the phases of development that are involved.

As a result of this ,we can see that, concept phase starts after the pre-production phase, during thus process, there should be a pre-production that helps to have an idea of the whole process.

Therefore, The concept phase starts after the pre-production phase of development in programing process.

Learn more about phases of development at;

https://brainly.com/question/16397886

Which options are available in the Conditional Formatting dialog box?

Answers

Answer:

all but b are correct.

Explanation:

did someone really hang themselves on wizard of oz

Answers

i think so the cast is def scary

why does messenger keep saying waiting for network

Answers

you prob need to fix your data or redownload it again

Please please help ASAP please

Answers

Answer:

he say yes would i do so way 2 be hey i oh peepo

Explanation:

did someone actually hang themselves on the wizard of oz set

Answers

No - its a rumour started since the films 50th anniversary in 1989.

what is the most common type of storage device for transferring files from one computer to another?

Answers

Answer:

USB flash drives is the most common type of storage device for transferring files from one computer to another

Which is considered both an input and output device?

Keyboard
Microphone
Speaker
Touchscreen monitor

Answers

Answer: touchscreen monitor

Explanation:

devices are the pieces of hardware used by a human (or other system) to communicate with a computer. For instance, a keyboard or computer mouse is an input device for a computer, while monitors and printers are output deviceshope this help.

Answer:

Touchscreen monitor

Explanation:

You touch it to input commands since it's a touchscreen and it is also a visual output device that interprets data into a picture.

Hope this helps :)

____ is the state of not sharing information with or being observed by others.

Answers

Answer:

Privacy(guessed ,not really sure about it).

which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

Answers

The kind of system software that tells the computer how to communicate with peripherals, such as a printer or scanner, is known as "device driver."

A device driver is a set of computer programs or software files that run specific devices or gadgets to perform their designed functions while connected to the computer system.

A device driver is a form of software file that ensures hardware device functions as designed.

Several types of device drivers include:

BIOS;Motherboard Drivers;Hardware Drivers;Virtual Device Drivers.

Hence, in this case, it is concluded that the correct answer is Device Driver.

Learn more here: https://brainly.com/question/19473613

Two structural members that cross each other when strengthening structures A. Triangulation B.cross bracing C.Lintel D.cantilever​

Answers

Cross bracing I think

what is the answer ?????​

Answers

Answer:

1) Driver or option D

2) Kindle or option C

please help me i will give brainly

Answers

Answer:

CPU: central processing unit.

Operating System: system software that is installed on a computer to control and organize its component parts.

RAM: random access memory.

save as: command in the File menu that enables users to save their file to a different location.

Folder: an object that contains multiple documents or files.

icons: pictures that represent different commands or actions that you want the computer to perform.

Directory: index of all the files stored on the computer.

FAT: an organizational system used to organize files.

A document used to convince a panel of potential funders to help a product, programor service become reality.

Answers

Answer:

Concept paper

Explanation:

The light in a room must be turned on when there is one or more person in the room and turned off the rest of the time. A sensor is used to detect if there is someone in the room. Describe the use of a microprocessor to control the light in the room.

Answers

Answer:

ZOO WEE MAMA

Explanation:

ZOO WEE MAMA 23

the fast speed of _______ available today enable computers to work very fast​

Answers

Answer:

main hardware components such as:

1. CPU

2. RAM

3. Motherboard (bus speed)

4. Hard drive

5. Video Card

6. Cache

7. Latest operating system (Windows XP, Windows 10, etc.)

How would you rate your prior knowledge or comfort level with the topic of technology applications?


A.

I am a technology application expert.

B.

I know a lot, but not everything about technology applications.

C.

I know a few things about technology applications.

D.

I am not familiar at all with technology applications.

Answers

Answer:

A

Explanation:

I know cyber security and Javascript and also a framework called svelte to create websites.

Son las características de la topología anillo *
5 puntos
Opción 1 Todas las terminales son inteligentes.
Opción 2 Todas las terminales son brutas.
Opción 3 Todas las terminales almacenan.

Answers

The 3rd onee i think if not 4th
Other Questions
Tell me an operational definition for each underlined idea. You can do one, but the more you do the more points you get. Thank you!!! 3[-2(8-13)] how to solve it japan is the ... developed country in the world a. most second b. second in most c. second most d. two most Thomas, a waiter at a local restaurant, is paid $ 4 an hour plus tips. His friend Marie works at a local bookstore for $12 an hour. Marie and Thomas worked the same number of hours. If Thomas made $120 in tips and both made the same amount of money, how many hours1.please just give me the first step on how its written out 7The Hunger Games is an example of a story that falls where on the historical timeline?O A.It is set in the past.B.It is set in the present.O C.It falls outside the historical timeline.O D.It is set in various realities.ResetNext Allison and Lindsey each measured their bedrooms for new carpeting. They foundthat both rooms were square, with the length of Lindsey's room 3 feet longer thanAllison's. If Lindsey needed 225 square feet of carpeting, how many square feet ofcarpeting did Allison need? I'll mark BRAINLIEST to whoever answers first. a * b > aFor this statement to be true, b must be;greater than 1 or less than oneSelect the correct answer. Temperature ConversionsUse the formulas below to convert the temperature in each problem. Show your work.Formulas: C -0.56(F-32) F = 1.8C+32 K-C + 273C-K-27341. Convert 22 C to 'F.42. Convert 22 C to K.43. Convert 30 F to C.44. Convert 300 K to C. What are some reasons teens engage in risky behaviors such as smoking, drinking Drag the geographic term to its proper spot on the world map.The World100 150 12090600O30600120150100>Ponett100 150 120 900 30150 180:: Equator:: Prime Meridian:: International Dateline:: South Pole in general, what do students and staff think about how many students drink? What is the solution to this equation?7- 32-x=12 please help with this HELPPPPPPPPP ASAPPPPPPPPPPP!!!!!! What is 25% of $30?Somebody please explain with proof thanks! facts about the industrial revolution in england The correct answer is "Greater at 72 F " hope it helps Please solve!!!! I have been trying to figure out for the past 20 years of my life> help with top one? thankss 13. Analyze: How much money is 1/2 of a dollar plus 3/4 of a dollar plus 3/10 of a dollar? I keep forgetting my fractions.