Logo
Flashcard >QCH4 Quiz Chapter 4
Add Flashcard
1/10

Under the GDPR, the ability for a user to transfer personal data between service providers is called _________. ​

a. "the right to switch"
b. "the right to portability"
c. "the service provider switch"
d. "the data transfer protocol"

b. "the right to portability"

profile imgdavidap posted 10 months ago

Under the GDPR, the ability for a user to transfer personal data between service providers is called _________. ​

a. "the right to switch"
b. "the right to portability"
c. "the service provider switch"
d. "the data transfer protocol"

b. "the right to portability"

According to the 1980 revisions to the Copyright Act of 1976, _____.

a. both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
b. the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers
c. copyright protection extends to original works of authorship in architectural fields
d. copyright holders can perform a copyrighted work by means of digital audio transmission

a. both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs

Which can help offset the digital divide?

a. Increasing the speed of the Internet for the information rich
b. Reducing the number of computer equipment at schools
c. Reducing the Internet bandwidth for the information poor
d. Increasing the number of computers in public places

d. Increasing the number of computers in public places

With employee-monitoring systems, managers can supervise employees’ work speeds.
True

False

True

One of the major business benefits of GDPR compliance is ________.
a. increased maintenance costs
b. improved consumer confidence
c. it is no longer necessary to align with evolving technology
d. reduced data security

b. improved consumer confidence

_____ make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases. a. Cookies
b. Trojans
c. Applets
d. Kernels

a. Cookies

URL _____ is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser.

a. decoding
b. hijacking
c. parsing
d. opening

b. hijacking

_____, which are generated by Web server software, record a user’s actions on a Web site.

a. Junk e-mails
b. Worms
c. Viruses
d. Log files

d. Log files

_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.

a. Green computing
b. Cloud computing
c. Natural computing
d. Mobile computing

a. Green computing

Green computing can be achieved by:

a. replacing one large server with several underutilized smaller servers.
b. using computing devices that are nonbiodegradable.
c. replacing meetings over computer networks with actual face-to-face meetings.
d. using video conferencing, electronic meeting systems, and groupware.

d. using video conferencing, electronic meeting systems, and groupware.

Recommended Books

Reading books is a great way to learn. Here are some of the books we recommend.