answersLogoWhite

0

I'm also looking for the answer :D share it to me if you know ..

LIKE it .. ajejeje :J

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What legislation exist in Malaysia regarding data protection and security?

Malaysia passed a data protection law in 2010. It regulates the collection, processing, and storage of data that belongs to the general population. It also deals with the exploitation of personal data for personal or business profit.


When do you need a data processing agreement in your business operations?

A data processing agreement is needed in your business operations when you engage a third party to process personal data on your behalf, to ensure compliance with data protection regulations and safeguard the privacy of individuals.


Online Storage?

form_title=Online Storage form_header=Manage all of your business data online with reliable data storage services. Do you need online storage for personal or business use?= () Personal () Business How much space do you need?=_ Do you need more than one online storage account?= () Yes () No


What is a model view controller used for?

A model view controller is a software architecture pattern and the model is made up of application data, business rules, logic and functions and it separates the representation of information from the user's interaction with it. Basically, it can be used for personal computing, but more often it is used nowadays for world wide web applications as an architecture.


What has the author F Robert Crawford written?

F. Robert Crawford has written: 'Business systems with punched card data processing and system/3 model 10' -- subject(s): Accounting, Business, Data processing


Explain the Model-View-ViewModel (MVVM) architecture pattern?

The Model-View-ViewModel (MVVM) architecture pattern separates the development of the graphical user interface from the business logic or back-end logic (the data model). The Model represents the data and business logic, the View is the user interface, and the ViewModel acts as an intermediary, handling the logic and data binding between the Model and the View. This pattern enhances code maintainability, testability, and separation of concerns, making it easier to manage and evolve complex applications.


Six model stages of growth?

In year 1970s, Richard L. Nolan an American business theorist developed the model for growth and then published by Harvard Business Review. Initiation, contagion, control, integration, data administration and maturity are the six model stages of growth.


What is a undesirable business practice?

Data privacy violations: Collecting and using consumer data without proper consent or transparency is a major concern. This includes practices like data scraping (illegally harvesting personal information) or selling user data to third parties without proper notification.


Explain data model?

Explain data model?


What has the author Carolyn Meinhardt written?

Carolyn Meinhardt has written: 'Business applications using the IBM PC' -- subject(s): Business, Data processing, IBM Personal Computer


Briefly explain what identity theft and data theft crimes are?

Identity theft is when someone steals personal information from a person-such as social security number of passport-in an attempt to access and steal money or other items. Data theft is the taking of data from a personal or business device such as a hard drive.


Define data models and list different types of data models?

A data model is a collection of concepts that can be used to describe the structure of a database and provides the necessary means to achieve this abstraction whereas structure of a database means the data types,relationships and constraints that should hold on the data. Data model are divided into three different groups they are 1)object based logical model 2)record based logical models 3)physical models Types: Entity-Relationship (E-R) Data Model Object-Oriented Data Model Physical Data Model functional data model