Correct Answer
verified
Multiple Choice
A) Trademarks
B) Industrial designs
C) Artistic works
D) Inventions
Correct Answer
verified
Multiple Choice
A) information barrier
B) domain squat
C) data junction
D) digital divide
Correct Answer
verified
Multiple Choice
A) phishing
B) nonrepudiation
C) spoofing
D) accountability
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) cookie
B) bookmark
C) spam
D) draft
Correct Answer
verified
Multiple Choice
A) They protect new processes.
B) They protect product names.
C) They protect tangible material, such as books.
D) They protect product identifying marks, such as logos.
Correct Answer
verified
Multiple Choice
A) cybersquatting
B) censorship
C) copyright
D) spamming
Correct Answer
verified
Multiple Choice
A) Cloud computing
B) Mobile computing
C) Green computing
D) Natural computing
Correct Answer
verified
Multiple Choice
A) key customer numbers
B) Virtual Account numbers
C) Social Security numbers
D) protected electronic numbers
E) Select
Correct Answer
verified
Multiple Choice
A) provide wrong data to unauthorized users.
B) use verification procedures to ensure data accuracy.
C) keep collected information even after the stated purpose is over.
D) provide access to one's personal information to all interested parties.
Correct Answer
verified
Multiple Choice
A) acceptable use policy
B) standard data policy
C) article ownership policy
D) user content policy
E) Select
Correct Answer
verified
Multiple Choice
A) job restraining
B) job upgrading
C) job deskilling
D) job sharing
Correct Answer
verified
Multiple Choice
A) It generates approximately six percent of the world's greenhouse gases.
B) It generates approximately two percent of the world's carbon dioxide emissions.
C) It helps organizations save energy costs.
D) It improves the quality of the environment in which you work.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) cease charging different rates on data
B) treat data based on the types of application
C) start blocking data traffic to specific users
D) discriminate data based on content
Correct Answer
verified
Multiple Choice
A) They need central offices for participants to contribute their expertise.
B) They are networks of dependent companies and manufacturers connected via information technologies.
C) They let independent suppliers share skills and have access to each other's markets via information technologies.
D) They need an organizational hierarchy for participants to contribute their expertise.
Correct Answer
verified
Multiple Choice
A) ethical, but illegal
B) unethical, but legal
C) illegal and unethical
D) legal and ethical
Correct Answer
verified
Multiple Choice
A) Public
B) Private
C) Secretive
D) Abstracted
Correct Answer
verified
Showing 21 - 40 of 80
Related Exams