FUNDAMENTALS OF COMPUTER

TECHNOLOGYS ETHICAL LEGAL PRIVACY ISSUES

USING PRIVACY SETTINGS IN SOCIAL MEDIA

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
In general, when visiting sites on the Internet providing various services, you expect that the proper treatment of your privacy and your personal data depends on the good will of the service provider (e.g. the owner of the website).A better way to ensure your privacy would be that service providers embed privacy decisions directly in the technology itself rather than only stating their general obligations in legal documents.Embedding privacy decisions in technology goes by the name of ____
A
Antivirus software
B
Data Protection by Design
C
Cryptography
D
None of the above
Explanation: 

Detailed explanation-1: -Segregation allows the cloud provider to divvy up resources to the different groups, and isolation ensures they can’t see or modify each others’ assets. Multitenancy doesn’t only apply across different organizations; it’s also used to divvy up resources between different units in a single business or organization.

Detailed explanation-2: -Encryption is an effective, well-established method for securing and transporting confidential data.

Detailed explanation-3: -Explanation: For hosting private clouds, a hyper-converged infrastructure (HCI) is the best option.

Detailed explanation-4: -Cloud security, also known as cloud computing security, is a collection of security measures designed to protect cloud-based infrastructure, applications, and data. These measures ensure user and device authentication, data and resource access control, and data privacy protection.

There is 1 question to complete.