answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna35 [415]
2 years ago
13

Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data

in aggregate?
Computers and Technology
1 answer:
iren [92.7K]2 years ago
4 0

Answer:

De-identification or data anonymization.

Explanation:

Privacy rights are fundamental right of individuals to privatise all personal information, when creating an account.

The de-identification and data anonymization technology is provided by the organisation to user, to prevent their information to be viewed by others. It commonly used in cloud computing, communication, internet, multimedia etc. Reidentification is the reversing of the de-identification effect on personal data.

You might be interested in
Which bus slot provides highest video performance​
Tresset [83]

Answer:

The best slot to use for video cards is the PCI-Express x16 slot. The next best is the AGP slot. The next best is a PCI-Express x1 slot but video cards which fit that slot are very hard to find as of late 2006. The worst choice for a video card is a PCI slot.

4 0
2 years ago
15. It is the process of capturing data or translating information to recording format
Helen [10]

Answer:

A Documentation, hope this helps.

5 0
2 years ago
Always refill your gas tank well before____.
mash [69]

Aloha~. My name is Zalgo and I am here to be of assistance with your problem. The answer to your question is D. The minimum amount of gas you can leave in your vehicle is 1/4 Full or 3/4 Empty. The most amount you will need is quite close to when your gas tank is full (so 1/4 Empty or 3/4 Full).

Hope this helps.

"Stay Brainly and stay proud!" - Zalgo

4 0
2 years ago
Read 2 more answers
Is used to process certificates and private/public key information?
Luda [366]
<span>SSL is used to process certificates and private/public key information. </span>SSL stands for Secure Sockets Layer. It is cryptographic protocols <span> that creates a trusted environment and </span>provides communications security over a computer network. The SSL protocol is used for establishing encrypted links between a web server and a browser.
4 0
2 years ago
Each level of a smartphone app adds more gems for you to match. On level one, there were 13 gems. On level twelve, there were 12
Sidana [21]
<span>Level : 1,2,3,4,5,6,7,8,9,10,11,12
Gems : 13 to 123
We have to increase from 13 to 123 over a span of 11 levels.
That's an increase of 110 over 11 levels.
110 / 11 = 10
So we go up 10 gems each level Level : 1,2,3,4,5,6,7,8,9,10,11,12
Gems : 13 23 33 43 53 63 73 83 93 103 113 123</span>
5 0
2 years ago
Other questions:
  • A storyboard is essentially an outline of a web page's content and design<br> -True or False
    8·2 answers
  • A mouse is known as a _____ device that is able to detect motion in relation to the surface and provides an onscreen pointer rep
    6·1 answer
  • In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
    5·1 answer
  • A Class B network needs to be subnetted such that it supports 100 subnets and 100 hosts/ subnet. Which of the following answers
    8·1 answer
  • "In about 100 words, discuss the technologies that Walmart’s trucking fleet might use to better manage their operations. Include
    7·1 answer
  • The signature area in a cover letter includes the sender's first and last name, followed by his/her job title (if applicable). *
    13·1 answer
  • Write a split check function that returns the amount that each diner must pay to cover the cost of the meal The function has 4 p
    14·1 answer
  • Design and implement an algorithm that gets as input a list of k integer values N1, N2,..., Nk as well as a special value SUM. Y
    12·1 answer
  • Why is it important for element IDs to have meaningful names?
    11·1 answer
  • What prevents someone who randomly picks up your phone from sending money to themselves using a messenger-based payment?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!