Correct Answer
verified
Multiple Choice
A) Police visits to individuals whom a computer system identified as likely to commit a crime in the future.
B) Use of a device installed in a car to analyze driving habits.
C) Use of a predictive modeling system that predicts life expectancy by using data about individual consumers' buying habits as well as personal and family medical histories.
D) Use of computerized systems to filter and hire job applicants.
E) Analyzing data from sensors installed in local parks to monitor soil moisture.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Property rights and obligations
B) System quality
C) Accountability and control
D) Information rights and obligations
E) Quality of life
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Apple and Microsoft
B) Apple and Hewlett-Packard
C) Microsoft and Symantec
D) Microsoft and Facebook
E) Apple and Samsung
Correct Answer
verified
Multiple Choice
A) assigning responsibility.
B) identifying the stakeholders.
C) identifying the options you can reasonably take.
D) identifying and clearly describing the facts.
E) identifying the potential consequences of your options.
Correct Answer
verified
Multiple Choice
A) COPPA
B) P3P
C) PGP
D) FIP
E) safe harbor
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Family and home
B) Property rights and obligations
C) System quality
D) Accountability and control
E) Quality of life
Correct Answer
verified
Multiple Choice
A) Regulated common carriers
B) Private individuals
C) Organizations and businesses
D) Elected officials
E) European ISPs
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Flash cookies are installed only at the user's request.
B) Flash cookies are stored on the user's computer.
C) Flash cookies cannot be easily detected or deleted.
D) Flash cookies are sometimes called super cookies.
E) Flash cookies can be installed whenever a person clicks a Flash video.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Slippery-slope rule
B) Lemming rule
C) High-failure cost rule
D) Utilitarian principle
E) Golden Rule
Correct Answer
verified
Multiple Choice
A) Profiling
B) Phishing
C) Spamming
D) Targeting
E) Spyware
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Software bugs
B) Software errors
C) Hardware failures
D) Facilities failures
E) Data quality
Correct Answer
verified
Showing 61 - 80 of 100
Related Exams