A) They protect new processes.
B) They protect product names.
C) They protect tangible material, such as books.
D) They protect product identifying marks, such as logos.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a virus
B) a bug
C) spam
D) a cookie
Correct Answer
verified
Multiple Choice
A) illegal and unethical
B) legal, but unethical
C) illegal, but ethical
D) legal and ethical
Correct Answer
verified
Multiple Choice
A) experienced labor is eliminated by high technology.
B) a worker is promoted from a semiskilled to a skilled position.
C) a job is carried out manually.
D) fragmented jobs are combined as a whole.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) User consent must be given for processing of personal information.
B) Collected data must be anonymized to protect privacy.
C) Ease of use.
D) Safe data transfer across borders.
Correct Answer
verified
Multiple Choice
A) "the right to portability"
B) "the right to switch"
C) "the data transfer protocol"
D) "the service provider switch"
Correct Answer
verified
Multiple Choice
A) It must be used and interpreted with caution.
B) It must be sold to telemarketing firms.
C) Users supply truthful answers to online surveys.
D) Personal information is never used without the user's consent.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) They need central offices for participants to contribute their expertise.
B) They are networks of dependent companies and manufacturers connected via information technologies.
C) They let independent suppliers share skills and have access to each other's markets via information technologies.
D) They need an organizational hierarchy for participants to contribute their expertise.
Correct Answer
verified
Multiple Choice
A) ethical, but illegal
B) unethical, but legal
C) illegal and unethical
D) legal and ethical
Correct Answer
verified
Multiple Choice
A) provide wrong data to unauthorized users.
B) use verification procedures to ensure data accuracy.
C) keep collected information even after the stated purpose is over.
D) provide access to one's personal information to all interested parties.
Correct Answer
verified
Multiple Choice
A) credit cards
B) e-checks
C) debit cards
D) e-wallets
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) safeguarding health insurers' credit information.
B) protecting medical providers' notes and records.
C) protecting patients' bank information.
D) safeguarding conversations between patients and their families.
Correct Answer
verified
Multiple Choice
A) Increasing the speed of the Internet for the information rich
B) Increasing the number of computers in public places
C) Reducing the number of computer equipment at schools
D) Reducing the Internet bandwidth for the information poor
Correct Answer
verified
Multiple Choice
A)
If any organization's Web site collects any of the regulated data from EU users, it is liable to comply to GDPR.
B)
If any EU organization's Web site collects any of the regulated data from US users, it is liable to comply to GDPR.
C)
If any US organization's Web site collects any of the regulated data from US users, it is liable to comply to GDPR.
D)
If any organization's Web site collects any of the regulated data from users worldwide, it is liable to comply to GDPR.
Correct Answer
verified
Multiple Choice
A) Digital computing
B) Soft computing
C) Green computing
D) Cyber computing
Correct Answer
verified
Showing 81 - 100 of 124
Related Exams