Under the GDPR, the ability for a user to transfer personal data between service providers is called _________.
a. "the right to switch"
b. "the right to portability"
c. "the service provider switch"
d. "the data transfer protocol"
b. "the right to portability"
davidap posted 10 months ago
Under the GDPR, the ability for a user to transfer personal data between service providers is called _________.
a. "the right to switch"
b. "the right to portability"
c. "the service provider switch"
d. "the data transfer protocol"
b. "the right to portability"
According to the 1980 revisions to the Copyright Act of 1976, _____.
a. both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
b. the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers
c. copyright protection extends to original works of authorship in architectural fields
d. copyright holders can perform a copyrighted work by means of digital audio transmission
a. both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
Which can help offset the digital divide?
a. Increasing the speed of the Internet for the information rich
b. Reducing the number of computer equipment at schools
c. Reducing the Internet bandwidth for the information poor
d. Increasing the number of computers in public places
d. Increasing the number of computers in public places
With employee-monitoring systems, managers can supervise employees’ work speeds.
True
False
True
One of the major business benefits of GDPR compliance is ________.
a. increased maintenance costs
b. improved consumer confidence
c. it is no longer necessary to align with evolving technology
d. reduced data security
b. improved consumer confidence
_____ make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases.
a. Cookies
b. Trojans
c. Applets
d. Kernels
a. Cookies
URL _____ is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser.
a. decoding
b. hijacking
c. parsing
d. opening
b. hijacking
_____, which are generated by Web server software, record a user’s actions on a Web site.
a. Junk e-mails
b. Worms
c. Viruses
d. Log files
d. Log files
_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.
a. Green computing
b. Cloud computing
c. Natural computing
d. Mobile computing
a. Green computing
Green computing can be achieved by:
a. replacing one large server with several underutilized smaller servers.
b. using computing devices that are nonbiodegradable.
c. replacing meetings over computer networks with actual face-to-face meetings.
d. using video conferencing, electronic meeting systems, and groupware.
d. using video conferencing, electronic meeting systems, and groupware.