Filters
Question type

Study Flashcards

The Third Amendment to the U.S. Constitution has to do with


A) freedom of speech and religion.
B) search warrants.
C) the right to bear arms.
D) quartering of soldiers in private homes.
E) self-incrimination.

F) A) and D)
G) A) and B)

Correct Answer

verifed

verified

The practice of mailing advertisements only to the most likely prospects is called


A) discriminatory mailing.
B) focused mailing.
C) mail list trimming..
D) predatory mailing.
E) targeted direct mail.

F) B) and D)
G) None of the above

Correct Answer

verifed

verified

E

The process of searching through many records in one or more databases looking for patterns or relationships is called


A) credit reporting.
B) data mining.
C) information gathering.
D) microtargeting.
E) pattern matching.

F) C) and D)
G) A) and D)

Correct Answer

verifed

verified

An RFID is


A) a magnetic bar code.
B) a microscopic bar code.
C) a wireless transmitter.
D) a biometric identification device.
E) a random field interferometry device.

F) All of the above
G) None of the above

Correct Answer

verifed

verified

C

Who wrote an influential paper in the 1890s urging that privacy rights be enacted into law?


A) Benn and Brandeis
B) Benn and Thomson
C) Levine and Benn
D) Thomson and Warren
E) Warren and Brandeis

F) B) and D)
G) A) and C)

Correct Answer

verifed

verified

Who wrote that every violation of a "privacy right" is also a violation of another right?


A) Stanley Benn
B) Louis Brandeis
C) Morton Levine
D) Judith Jarvis Thomson
E) Samuel Warren

F) D) and E)
G) B) and E)

Correct Answer

verifed

verified

Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a


A) Constitutional right.
B) legal right.
C) natural right.
D) prudential right.
E) social right.

F) A) and D)
G) B) and C)

Correct Answer

verifed

verified

D

When information is put to another purpose, that is called a


A) backdoor exploit.
B) collaborative filter.
C) cookie.
D) data leveraging opportunity.
E) secondary use of the data.

F) B) and D)
G) A) and B)

Correct Answer

verifed

verified

An example of a public record is


A) a birth certificate.
B) a marriage license.
C) a deed to a house.
D) a record of a criminal conviction.
E) All of the above

F) All of the above
G) A) and B)

Correct Answer

verifed

verified

The OnStar system allows


A) a vehicle owner to initiate a conversation with an OnStar representative.
B) the vehicle to automatically send a message to an OnStar representative after an accident.
C) an OnStar representative to disable the gas pedal of the vehicle without the driver's permission.
D) a and b
E) a, b, and c

F) C) and D)
G) B) and C)

Correct Answer

verifed

verified

A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called


A) fair use.
B) full disclosure.
C) nondisclosure.
D) opt-in.
E) opt-out.

F) A) and E)
G) B) and D)

Correct Answer

verifed

verified

A public record contains information about an incident or action reported to a government agency for the purpose of


A) enhancing public safety.
B) informing the public.
C) protecting the innocent.
D) regulating the economy.
E) upholding the law.

F) A) and E)
G) All of the above

Correct Answer

verifed

verified

Flash cookies are controversial, in part, because


A) they are commonly used by identify thieves to steal credit card numbers.
B) they consume huge amounts of hard disk space.
C) they allow online retailers such as Amazon.com to track online shopping on other Web sites.
D) they are not controlled by the privacy controls of most Web browsers.
E) All of the above

F) B) and E)
G) A) and B)

Correct Answer

verifed

verified

Showing 1 - 13 of 13

Related Exams

Show Answer