The FaceSnap app has permission to use many devices on your smartphone, including the camera. A data privacy concern that arises from this is that the company could access the camera to see what you're doing without your knowledge.

Answers

Answer 1

Question:

Why is it not given points for Row 6(identifying data that is used by innovation and how the data is consumed), and Row 7 (identify one data storage, privacy, or security concern)

Answer:

The statement provides shares details on the computer innovation and does not show how the data is used by the app, what FaceSnap does with the information given to it.

Row 7: No specific data security concern


Related Questions

The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) _______.
a) pseudocode
b) flowchart
c) algorithm
d) structure chart

Answers

Answer:

algorithm

Explanation:

For a DBMS to be efficient and more functional, data redundancy needs to be eliminated. This can be accomplished by creating smaller tables, with stable data structures, using what process?
a.) Data administration
b.) Data dictionary
c.) Data normalization
d.) Data retrieval

Answers

Answer:

c.) Data normalization

Explanation:

Data normalization is the a process to organize tables in the database in such a way that data redundancy and anomalies (as a result of data manipulation) can be eliminated. So data normalization arranges the data in the form of tables, remove redundant data from the tables and eliminates duplicated data and also makes a large table into smaller tables. These small tables can then be associated to each other by making relationships between them. Data normalization also reduces the problems created by the data modification. These are often referred to as data anomalies e.g. insertion , deletion and update anomalies. Lets say a large table has redundant or repeated data. Without normalization the redundant data will take more space in the memory. Also it will not be easy to update data in such a table as it might result in data loss.3 basic types of database normalization forms are First normal form (1NF), Second normal form (2NF) and Third normal form (3NF). Others include Boyce-Codd Normal Form (BCNF) , Fourth Normal form etc.1NF states that columns of the tables which are also called attributes should have atomic values, 2NF form handles Partial Dependency and 3NF form handles Transitive Dependency.

When formulating a linear programming problem on a spreadsheet, objective cells will show the levels of activities for the decisions being made. A)True B) False

Answers

Answer:

B. False

Explanation:

Linear programming is a mathematical technique that optimises the linear constraints and objectives functions, which is the quantity whose value needs to be maximized or minimised, using the value stored in a variable.

The spreadsheet application is used to run the linear program on a particular cell, in apps background and automatically, once the enter key is pressed.

Most programming languages allow you to ask two or more questions in a single comparison by using a(n) ____ operator that joins decisions in a single statement.

Answers

Answer:

And is the correct answer for the above question.

Explanation:

And operator is an operator in the programming language which described two decisions in a single statement and it gives true if both the condition defined in the statement is true and it gives false if any of the conditions defined in the statement gives the false result.The above question-statement asked about that operator by which the user can write the two conditions in a single statement. Then the answer is And operator. One example for And operator in c language with if statement is-- if(a>=5&&a<=10), in which && symbols represents AND operator.
Final answer:

Logical operators like AND and OR in programming languages allow you to ask two or more questions in a single comparison. The AND operator requires both conditions to be met, while the OR operator requires at least one of the conditions to be met.

Explanation:

Most programming languages allow you to ask two or more questions in a single comparison by using a logical operator that joins decisions in a single statement. Logical operators include AND and OR operators. The AND operator (often symbolized as & or &&) allows for two conditions to be met, whereas the OR operator (often symbolized as | or ||) stipulates that at least one of the conditions be met. For example, in the statement if (age > 18 && citizenship == 'American'), both conditions (the age being greater than 18 and the citizenship being American) have to be satisfied due to the AND operator.

Learn more about Logical Operators here:

https://brainly.com/question/36193462

#SPJ3

Which do web servers host?
Websites
Networks
Firewalls
Zones

Answers

Answer:

Websites

Explanation:

A web server host websites, individuals or corporate websites, this helps us to show our websites in the World Wide Web, there are several companies offers this service, even we can get a free host, but a corporate website or a social media needs a lot of host recourses, these hosts are expensive than other, we could pay a web host monthly or per year.

Which type of memory contains the instructions necessary for the computer's basic input/output system (BIOS) which is used to load essential data when the computer is turned on?

Answers

Answer:

Memory that contain the basic I/O system is called ROM. which is read only memory and it contain the all the basic Input/output system which is used to load essential data when the computer is turned on.

I hope it will help you!

A single set of hardware, software, databases, telecommunications, people, and procedures that are configured to collect, manipulate, store, and process data into information.

Answers

Answer:

"Computer Based Information system (CBIS)" is the correct answer for the above question.

Explanation:

CBIS means about that system that is used to produce the information or process the information and it is computer-based because CB stands for computer-based and IS stands for an information system.It means that a system that helps by the computer and it is used to process the information then it can be called CBIS.To process the information in a computer system there is a need for software, people, database, hardware and processor which is a set of CBIS.The above question also wants to ask about the system which is a set of software, people, database, hardware and processor then it is known as CBIS which is described above. Hence the answer is CBIS.

Final answer:

The question describes an Information System (IS), a key aspect in Computers and Technology. An IS is a set of hardware, software, data, people, and procedures that work together to produce quality information. These components are vital to organizations, businesses and institutions.

Explanation:

The question describes a Information System, a key concept in the field of Computers and Technology. An Information System (IS) is a combination of hardware, software, data, network resources, and people that collects, transforms and disseminates information in an organization. It can include a simple setup like a desktop computer hardware and spreadsheet software, to a complex system spanning entire corporations.

Components of Information SystemHardware: This includes devices like computers, servers, networking equipment.Software: These are the programs used to handle the data. This includes enterprise resource planning (ERP) systems, databases, and office suites.Data: Data are raw facts or observations, typically about physical phenomena or business transactions.Network: This can range from internal networks to cloud-based services.Procedures: These involve the strategies, policies, methods and rules for using an information system.People: Every system needs people if it is to be useful. Often the most over-looked element of the system are the people.

Learn more about Information System here:

https://brainly.com/question/36400653

#SPJ3

We have a file that has a name in it, but the name is written one character per line. We need to write this name to the screen. What is wrong with the following code? ifstream fileIn; fileIn.open("file.txt"); char ch; fileIn.get(ch) while(!fileIn.eof( ))

Answers

Answer:i think it is using alot of stuff also keyboard and document and the mouse

Explanation:

In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for attempted logon retries.A) True B) False

Answers

Answer:

B, False.

Explanation:

Remote access is the ability of a device in a network to achieve a remote connection and control of another system. Its connection is not physical but uses telecommunication or the internet to access systems that cannot be accessed physically.

The RDP or remote desktop protocol is an example of protocols used to remotely access other computers in a network. It connects to the graphical interface of the other computer. When private data is compromised in a remote access, automatic blocking cannot be used to cancel an already established connection, but the system should be shutdown to prevent further exposure.

A computer user who enters an incorrect formula in a spreadsheet that results in a serious error is a victim of which common problem?

Answers

Answer:

User mistake

Explanation:

If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to start your investigation?

Answers

Answer:

If we are investigating login issues then we have to start with 'security logs' in 'windows logs' portion of Event viewer.

Explanation:

Much information about login issues is contained in log files which are related to security because it is mostly security issue. Some it is also better to start with 'system logs' portion of windows logs portion of Event viewer when there may be system problems instead of security issues. But in most cases there is security issues so 'security logs' is better option overall

Final answer:

To investigate login issues on a Windows computer, start by checking the Security logs in the Event Viewer, as they record security-related events including login attempt details.

Explanation:

If you were investigating login issues on a Windows computer, a good place to start your investigation would be the Security logs in the Event Viewer. The Security logs, which are part of the Windows Logs category, record security-related events such as valid and invalid login attempts as well as events related to resource use like file operations and user management. By examining the details contained within these logs, you can identify patterns or anomalies that may indicate what is causing the login issues.

Suppose you want to click up- and down-arrows on a "control" to change the value of the product price in cell C7. What form control (two word answer) would you use?

Answers

Answer:

Spin button.

Explanation:

Spread sheet applications are softwares used to analyze and manipulate data for clean and easy data presentation.

It is composed of columns or fields and rows or records to make a worksheet of a workbook in the application. Each box on the worksheet is called a cell.

Data can be inputted directly to a cell or with functions and formulas and with the form control feature.

Form control is use to specify the range of input to use in cells for easy data input. The spin button of the form control is used to input data by pressing the up and down arrow key on the keyboard.

A technician looks at a motherboard and sees a 24-pin connector. What component would connect to the motherboard through the use of this 24-pin connector?

Answers

Power supply connects to the motherboard through the use of the 24 pin connector.

Explanation:

Power supply

is an electrical devicesource of it come from electrical gridability to convert different form of energy (solar, mechanical & chemical) to electrical energyConverts main AC voltage to low-voltage current3 types - linear voltage, switch, unregulatedIt is also called PSU unit (Power supply unit)have to protect from over current, high voltage, etcMandatory for laptop to charge and use later

"Power supply" would connect to the motherboard through the utilization of 24-pin connector. A complete explanation is below.

A device which thus provides electricity to something like a load, would be considered as Power Supply.All power supplies have always had an influencing input connections which thus accepts energies from a source for the production of a wide range of electronic phenomena, and one or more peak power connectors that send current to such loads.

Thus the above response is right.

Learn more:

https://brainly.com/question/3158552

Where is line-of-sight Internet common?
In space
Outdoors
Inside
In businesses

Answers

Answer:

In businesses

Explanation:

Line of Sight internet provides an over-the-air internet connection to buildings that have a clear line of sight to a dedicated mast. This means no underground cables, quicker installation times and lower latency. It is common in businesses.

For years 2010 to 2015, the computers produced and shipped in highest quantity were _____. (Note: All the choices represent a kind of computer).

1) desktop computers
2) laptop computers
3) tablets
4) smartphones

Answers

Answer: (4) Smartphones

Explanation:

According to the given question, the computer produced and also shipped at very large quantity that is smartphones.

As, smartphones is basically refers to the mobile computing device and it contain various types of hardware capabilities, Multimedia functions, internet and the operating system.

In the year 2010 to 2015, the production of the smartphones get increased as the smartphones are steadily developing worldwide because of its excellent feature and design of the model. It is also affordable and the market price of the smartphones are efficient.

 Therefore, Option (4) is correct answer.  

Answer:

Explanation:

According to the given question, the computer produced and also shipped at very large quantity that is smartphones.

As, smartphones is basically refers to the mobile computing device and it contain various types of hardware capabilities, Multimedia functions, internet and the operating system.

In the year 2010 to 2015, the production of the smartphones get increased as the smartphones are steadily developing worldwide because of its excellent feature and design of the model. It is also affordable and the market price of the smartphones are efficient.

Therefore, Option (4) is correct answer.  

Which is true about TCP and UDP? Choose two answers.
TCP is a connection-oriented protocol
TCP is often used in video streaming apps
UDP is often used for sending documents
UDP does not acknowledge a receipt of data

Answers

Answer:

TCP is a connection-oriented protocol

UDP does not acknowledge a receipt of data

Explanation:

TCP (Transmission Control Protocol) is a protocol to transfer data, this is one of the most important protocols on the entire internet, this method was implemented from the beginning of the network.

UDP (User Datagram Protocol) this is a protocol faster than TCP because this method doesn't establish a connection to sent data, in this case, always sent data, but TCP is more secure than UDP, and for that UDP is used to transfer music or videos, and TCP websites and database.

UDP doesn't need acknowledgment is done by UDP, is only concerned with speed.

Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri consider prior to taking the laptop apart? (Select all that apply.)
a. Try an external device before replacing the motherboard.
b. Make sure you have the correct processor for the motherboard.
c. Verify that the laptop is not under warranty.
d. Determine whether a teardown procedure is available.

Answers

Answer: Option(b), (c) and (d) are correct.

Explanation:

According to the question,Sherri should check that process is right for motherboard as incorrect processor may not be able to process instruction and operation successfully and rapidly.

She should also check the warranty of the laptop.If in case , laptop is under warranty then she can get it repaired or replaced as per the policy of laptop company. Tear-down process can be verified so that laptop can be dismantled to investigate the components of processor that is causing issue in processing or other part is responsible for slow execution.Option (a) is incorrect because external devices is attached with motherboard with help of ports and cables.Processor is the actual unit that can cause slow execution and external devices are not responsible for it.Thus, the correct options is option(b),(c) and(d).

Final answer:

Sherri should check if her laptop is still under warranty, ensure she has a compatible processor for her motherboard, and locate a guide for the proper teardown procedure before attempting to replace her laptop's processor.

Explanation:

Sherri should consider several factors before attempting to replace the processor on her laptop to address its slow performance. Firstly, she should verify that the laptop is not under warranty. Tampering with the hardware can void the manufacturer's warranty, and if the laptop is still covered, it might be more beneficial to seek professional repairs.

Secondly, it is essential to make sure you have the correct processor for the motherboard. Not all CPUs are compatible with every motherboard due to socket type, chipset, and power requirements. Lastly, Sherri should determine whether a teardown procedure is available to guide her through disassembling and reassembling her laptop safely.

Missing this step could lead to damage to the laptop components or render it completely inoperable when done incorrectly.

A digital certificate confirms that the macro created by the signer has not been altered since the digital certificate was createdA. TrueB. False

Answers

Answer: False

Explanation:

Digital certificate is defined as entity identification in digital form that is used by a user or firms to share their information along with authentication and security. It uses public key cryptographic technique and so it is also know as public key certificate.

Digital signature is the signature that is done digitally to secure data or document.It maintains security of the content present  in message of information that is being exchanged through e-signature.It follows encryption technique for maintaining authenticity.Therefore, digital signature is the signing feature that protects macro after being made to maintain its authenticity.Thus, the given statement is false.

What Windows Server 2016 feature leverages the storage contained on a network of servers and adds a new level of fault tolerance to server storage because fault tolerant volumes can now be spread among multiple servers?

Answers

Answer:

Storage spaces direct.

Explanation:

The windows operating system is system software used to manage all the activities running in the computer. The OS comes with an API that connects the system to a remote dedicated server known as the windows server. These server is updated annual, when the OP is up to date.

The windows server provides a limited storage platform and comes with a unique feature called the storage spaces direct. This feature allows access to multiple storage server to enhance fault tolerance.

Natalie is a secretary and must complete a large amount of filing this afternoon. At 1:00 PM, the office receptionist gets sick and goes home. The manager asks Natalie to fill in at the front desk for the rest of the afternoon. Which trait does Natalie demonstrate by adjusting her schedule?

Answers

Answer:

flexibility

Explanation:

she is able to adjust to the task that is being asked of her

A method of participant observation designed to help a researcher experience a culture's complex web of meaning is called textual analysis.True / False.

Answers

Answer:

The answer is "False".

Explanation:

The textual analysis is a method of research, that is used to describe and provides the understanding feature to understand the given text.

A process of observation by participants that helps a scientist knowledge of the complex network of the meaning of societies is known as Ethnography, that's why the given statement is false.

The main disadvantage of using this device is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.?

Answers

Answer:

Hub

Explanation:

Hub is used to connect devices in a network. It is also called a dumb device because it broadcasts the signals or messages on any of its ports to all other ports. For example a message has to be sent to a computer. Lets name that computer H. Hub will send that message to all connected ports on the hub not just considering that specific port of computer H. So hub is an unintelligent device which is not able to distinguish between devices and sends a messages to every port irrespective of which the destination host is. Now when the destination computer H responds to that message this too goes to all other ports on hub.This has a negative effect on network's performance as it might result in collisions between data packets.The bandwidth of hub is shared by all the devices connected to it. When a source host is sending a large amount of data to destination, it will take all the bandwidth which leads to slow network performance and access in other connected computers .The network speed and performances reduces as more devices are added.
Final answer:

The device referred to is a Network Hub, which is used to connect multiple devices in a network. Its disadvantage is that it broadcasts all incoming data to all connected devices, potentially causing unnecessary network traffic and impacting performance.

Explanation:

The device being described in the question is likely a Network Hub. Hubs are networking devices that connect multiple devices in a LAN (Local Area Network). The main disadvantage of a Hub is that it broadcasts the data it receives to all connected devices. This can negatively affect network performance because data might unnecessarily reach devices not intended to get the data, which can create network traffic. For example, if Computer A sends data to Computer B, the hub would broadcast this data to all connected devices, not just Computer B.

This disadvantage is not present in more sophisticated devices like Switches or Routers, as these devices intelligently direct the traffic to the intended recipient only, instead of broadcasting it to all devices.

Learn more about Network Hub here:

https://brainly.com/question/31860753

#SPJ3

Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed. True or false?

Answers

Answer:

The answer is False

Explanation:

Information Technology (IT) handles the proper transmission, storage, retrieval and manipulation of data using computers. It also includes the use of  computer software, hardware and other peripheral equipment.

Information Systems on the other hand  are organisational systems that are designed to retrieve, store, manipulate and share information. The following are core components of information systems:

TechnologyStructure (which include the various roles in the organisation)People andTask.

In JavaScript, what is the term for a built-in method that does not belong to any particular object, such as the isNaN() method?

Answers

Answer:

Top-level function  is the correct answer.

Explanation:

Top-level function  is the method in the JavaScript that is not a part of any other objects. It is built-in method in JavaScript such as isNaN() function, eval() function, _dump() function, print() function and may other functions. These functions are the object of the global variable or object.

So, that's why the following answer is correct.

When an object is created, the attributes associated with the object are called: A. instance fields B. instance methods C. fixed attributes D. class instances

Answers

Answer:

Option A is the correct answer for the above question

Explanation:

The object is used to take memory for the class member and functions because the class is the only structure which defines the types of the member for that class. The class object is used to reference a member of the class. The object of the class is known as an instance of the class and the one object variables value is different from the other objects variable value for the same class. So the object is used to holds the instance field because the object is used to initialize the value of the variable of the class. So the attributes associated with the class object can be called the instance field . The above question also asked the same and the answer is Instance field which is stated from the option A. Hence Option A is the correct answer while the other is not because--

Option B states about instance method which refers to the method of a class for which that object is created.Option C states about the fixed attributes which are not the correct answer.Option D states about class instances which refer to the object of the class.

Final answer:

In the context of programming, the attributes associated with an object are called instance fields. These variables differentiate different instances of a class.

Explanation:

When an object is created in the realm of programming, the attributes associated with the object are called instance fields. These are variables that are associated with an instance of a class. Another way to comprehend it is to visualize a class to be a blueprint. Each instance (or object) of that class can have different values for these fields. For example, if we have a class 'Car', potential instance fields might include color, make, model, etc. Each specific car (instance) would have specific values for these attributes.

Learn more about Instance Fields here:

https://brainly.com/question/31779226

#SPJ6

What type of IPv6 address should you use when you have multiple routers on a subnet and want hosts to use the nearest router for packets that should be delivered to remote networks?
-Unicast
-Anycast
-Multicast
-Broadcast

Answers

Answer:

Anycast

Explanation:

Anycast is linked with the BGP protocol which ensures that all of a router’s neighbors are aware of the networks that can be reached through that router and the topographical distance to those networks. The main principle of anycast is that an IP address range is advertised in the BGP messages of multiple routers. As this propagates across the Internet, routers become aware of which of their neighbors provides the shortest topographical path to the advertised IP address.

_____ is a form of control over physical space and the people and objects that reside in that space, and is a defining characteristic of statehood.a. Powerb. Ethicsc. Potentiald. Legitimacy

Answers

Answer:

The answer is "Option a"

Explanation:

The power is a means of control, that classifying characteristics of secession over the physical environment and the persons, objects which exist on that environment, and other options were wrong that can be described as follows:

In option b, It is a part of the philosophy of education, that's why it is not correct.Option c, Potential is used in the education section, that's why it is wrong.Option d, It is used in a single source computer, that's why it is wrong.

Consider the following two code segments: Segment 1: while (k > 0) { System.out.println(k); k--; } --------------- Segment 2: while (k > 0) { System.out.println(k); k--; } while (k > 0) { System.out.println(k); k--; } Assume that in both cases variable k has the same initial value. Under which of the following conditions will the two code segments produce identical output.

Answers

Answer:

Always same value

Explanation:

These both code segments will always generate identical values given that we provide same value of k to both segments.

You can see attached pictures.

Dr. Bassin, a hiring manager, is using the employee screening and selection device that is used more frequently than any other employee screening and selection device. Which device is she using?

Answers

Answer:HIRING INTERVIEWS

Explanation: Hiring interview is the most widely used employees screening and selection device,this involves the questioning of the potential employee,this process also involves various forms of assessment which may include the person's ability to express himself on the interview questions,the person's dressing and overall presentation. The person is assessed by a panel of persons which may be from the organisation or from external hiring companies.

What type of object is a GUI widget the user can click to select an option, and allows for any number of these objects to be selected at the same time?

Answers

Answer:

Checkbox

Explanation:

I remember this question.

Other Questions
The following question is based on your reading of 1984 by George Orwell. Why is Winston so determined to talk to the old man in the pub of Londons prole district? a. Only an elder prole can reveal the true identity of Big Brother. c. Proles, particularly elder proles, are considered intuitive and wise. b. The old man knows a secret way to shut off the telescreens. d. The prole is old enough to give a truthful account of the past. Please select the best answer from the choices provided A B C D The instrument that plays the lowest notes in an ensemble or group is called SopranoAltoTenorBassNOT ENGLISH BUT ITS Music Find a formula for the described function. A rectangle has perimeter 10 m. Express the area A of the rectangle as a function of the length, L, of one of its sides. Beasley Company currently sells its products for $ 20 per unit. Management is contemplating a 10% increase in the selling price for the next year. Variable costs are currently 30% of sales revenue and are not expected to change in dollar amount on a per unit basis next year (the company will pay the same amount for variable costs next year). Fixed expenses are $ 56 comma 000 per year. What is the breakeven point in units at the anticipated selling price per unit next year? A ____ brand usually requires a producer to become involved in distribution, promotion, and pricing decisions. a. manufacturer b. wholesaler c. store d. private distributor e. dealer According to Lewin's Change Model, an organization must deliberately change old habits, learn new work methods, and accept the new work methods as parts of the job. Study the graph below and answer the question.U.S. Department of Education, Institute of Education Sciences, National Center for Education Statistics.What kind of graph is this?pietablebarlinepictograph A current 1A in the human body is extremely dangerous. a) Estimate the potential difference needed to produce this current. b) Suggest why your are unlikely to be injured by an electric current in your house.Please answer both questions. What is the primary type of energy conversion that takes place inside abattery-powered phone when it is turned on?OA. Light energy to electrical energyOB. Chemical energy to electrical energyOc. Chemical energy to light energyOD. Electrical energy to chemical energy According to the passage, why did Wilson propose theLeague of Nations? [tex]1 \frac{3}{5} + \sqrt{4} [/tex] What is the magnitude of the minimum magnetic field that will keep the particle moving in the earth's gravitational field in the same horizontal, northward direction Signal Transduction Pathways What happens inside of a cell when a signal has been received? anyone wanna help out? Refer to the data in the introduction. Rank the seasons for the Northern Hemisphere based on Earths distance from the Sun when each season begins, from closest to farthest. a. winter.b. spring.c. fall.d. summer. What is area of this shape Housing prices have begun to drop. New home construction has stopped and fewer run-down houses are being repaired. (Use the graphs from the Supply and Demand Guide.) b. Imagine an unusual life form in which the N atom in an amino acid is changed to a C atom. Could a hydrogen bond in this unusual alpha helix occur? Why or why not? Suppose that 65% of all adults regularly consume coffee, 60% regularly consume carbonated soda, and 75% regularly consume at least one of these two products. (a) What is the probability that a randomly selected adult regularly consumes both coffee and soda? A plane was traveling from Florida to Canada. It flew 5 hours and went 1895km what was its velocity? Steam Workshop Downloader