A) freedom of speech and religion.
B) search warrants.
C) the right to bear arms.
D) quartering of soldiers in private homes.
E) self-incrimination.
Correct Answer
verified
Multiple Choice
A) discriminatory mailing.
B) focused mailing.
C) mail list trimming..
D) predatory mailing.
E) targeted direct mail.
Correct Answer
verified
Multiple Choice
A) credit reporting.
B) data mining.
C) information gathering.
D) microtargeting.
E) pattern matching.
Correct Answer
verified
Multiple Choice
A) a magnetic bar code.
B) a microscopic bar code.
C) a wireless transmitter.
D) a biometric identification device.
E) a random field interferometry device.
Correct Answer
verified
Multiple Choice
A) Benn and Brandeis
B) Benn and Thomson
C) Levine and Benn
D) Thomson and Warren
E) Warren and Brandeis
Correct Answer
verified
Multiple Choice
A) Stanley Benn
B) Louis Brandeis
C) Morton Levine
D) Judith Jarvis Thomson
E) Samuel Warren
Correct Answer
verified
Multiple Choice
A) Constitutional right.
B) legal right.
C) natural right.
D) prudential right.
E) social right.
Correct Answer
verified
Multiple Choice
A) backdoor exploit.
B) collaborative filter.
C) cookie.
D) data leveraging opportunity.
E) secondary use of the data.
Correct Answer
verified
Multiple Choice
A) a birth certificate.
B) a marriage license.
C) a deed to a house.
D) a record of a criminal conviction.
E) All of the above
Correct Answer
verified
Multiple Choice
A) a vehicle owner to initiate a conversation with an OnStar representative.
B) the vehicle to automatically send a message to an OnStar representative after an accident.
C) an OnStar representative to disable the gas pedal of the vehicle without the driver's permission.
D) a and b
E) a, b, and c
Correct Answer
verified
Multiple Choice
A) fair use.
B) full disclosure.
C) nondisclosure.
D) opt-in.
E) opt-out.
Correct Answer
verified
Multiple Choice
A) enhancing public safety.
B) informing the public.
C) protecting the innocent.
D) regulating the economy.
E) upholding the law.
Correct Answer
verified
Multiple Choice
A) they are commonly used by identify thieves to steal credit card numbers.
B) they consume huge amounts of hard disk space.
C) they allow online retailers such as Amazon.com to track online shopping on other Web sites.
D) they are not controlled by the privacy controls of most Web browsers.
E) All of the above
Correct Answer
verified
Showing 1 - 13 of 13
Related Exams