A) accountability of the record holder.
B) responsibility of the record holder.
C) mutuality of interest between the record holder and the individual.
D) privacy of the individual.
E) due process.
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) slippery-slope
B) risk aversion
C) categorical imperative
D) utilitarian principle
E) Golden Rule
Correct Answer
verified
Multiple Choice
A) COPPA
B) HIPAA
C) Gramm-Leach-Bliley Act
D) Video Privacy Protection Act
E) Computer Matching and Privacy Protection Act
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) COPPA
B) P3P
C) PGP
D) safe harbor
E) FIP
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Apple and Microsoft
B) Apple and Hewlett-Packard
C) Microsoft and Symantec
D) Microsoft and Facebook
E) Apple and Samsung
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) the distinction between tangible and intangible ideas.
B) the distinction between an idea and its expression.
C) using the graphical elements of another product.
D) using the creative elements of another product.
E) violation of a monopoly on the ideas behind a product.
Correct Answer
verified
Multiple Choice
A) data storage improvements.
B) data analysis advancements.
C) increase in data quality.
D) increase in use of mobile devices.
E) advances in networking technology.
Correct Answer
verified
Multiple Choice
A) a profiling technology used by the EU.
B) a federal privacy law protecting networked data.
C) a data analysis technology that finds hidden connections between data in disparate sources.
D) a sentencing guideline adopted in 1987 mandating stiff sentences on business executives.
E) an ethical principle.
Correct Answer
verified
Multiple Choice
A) property rights and obligations.
B) system quality.
C) accountability and control.
D) information rights and obligations.
E) quality of life.
Correct Answer
verified
Multiple Choice
A) Copyright
B) Patent
C) All forms of intellectual property protection
D) Trademark
E) Trade secret
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Less than 10 percent
B) Around 25 percent
C) About 50 percent
D) Nearly 80 percent
E) Over 90 percent
Correct Answer
verified
Multiple Choice
A) profiling.
B) phishing.
C) spamming.
D) targeting.
E) spyware.
Correct Answer
verified
True/False
Correct Answer
verified
Showing 21 - 40 of 100
Related Exams