Deck 5: Information Privacy

ملء الشاشة (f)
exit full mode
سؤال
An RFID is

A) a magnetic bar code.
B) a microscopic bar code.
C) a wireless transmitter.
D) a biometric identification device.
E) a random field interferometry device.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The OnStar system allows

A) a vehicle owner to initiate a conversation with an OnStar representative.
B) the vehicle to automatically send a message to an OnStar representative after an accident.
C) an OnStar representative to disable the gas pedal of the vehicle without the driver's permission.
D) a and b
E) a, b, and c
سؤال
An example of a public record is

A) a birth certificate.
B) a marriage license.
C) a deed to a house.
D) a record of a criminal conviction.
E) All of the above
سؤال
The Third Amendment to the United States Constitution has to do with

A) freedom of speech and religion.
B) search warrants.
C) the right to bear arms.
D) quartering of soldiers in private homes.
E) self-incrimination.
سؤال
The process of searching through many records in one or more databases looking for patterns or relationships is called

A) credit reporting.
B) data mining.
C) information gathering.
D) microtargeting.
E) pattern matching.
سؤال
Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a

A) Constitutional right.
B) legal right.
C) natural right.
D) prudential right.
E) social right.
سؤال
A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called

A) fair use.
B) full disclosure.
C) nondisclosure.
D) opt-in.
E) opt-out.
سؤال
Who wrote an influential paper in the 1890s urging that privacy rights be enacted into law?

A) Benn and Brandeis
B) Benn and Thomson
C) Levine and Benn
D) Thomson and Warren
E) Warren and Brandeis
سؤال
The practice of mailing advertisements only to the most likely prospects is called

A) discriminatory mailing.
B) focused mailing.
C) mail list trimming..
D) predatory mailing.
E) targeted direct mail.
سؤال
Manufacturers are replacing bar codes with because they give more information about the product and are easier to scan.
سؤال
When information collected for one purpose is put to another purpose, that is called a

A) backdoor exploit.
B) collaborative filter.
C) cookie.
D) data leveraging opportunity.
E) secondary use of the data.
سؤال
Flash cookies are controversial, in part, because

A) they are commonly used by identify thieves to steal credit card numbers.
B) they consume huge amounts of hard disk space.
C) they allow online retailers such as Amazon.com to track online shopping on other Web sites.
D) they are not controlled by the privacy controls of most Web browsers.
E) All of the above
سؤال
A is a file containing information about your visits to a Web site that is placed on your computer's hard drive by a Web server
سؤال
suggested that we do not have to define privacy rights because every "privacy right" violation is a violation of another right as well.
سؤال
With enhanced 911 service, cell phone providers are able to of active cell phone users.
سؤال
A public record contains information about an incident or action reported to a government agency for the purpose of

A) enhancing public safety.
B) informing the public.
C) protecting the innocent.
D) regulating the economy.
E) upholding the law.
سؤال
The process of searching through one or more databases, looking for patterns or relationships, is called .
سؤال
In 1890 Harvard-trained lawyers wrote a highly influential article in the Harvard Law Review stating that people in modern society have a right to privacy and that this right ought to be respected.
سؤال
A contains information about an incident or action reported to a government agency for the purpose of informing the public.
سؤال
Who wrote that every violation of a "privacy right" is also a violation of another right?

A) Stanley Benn
B) Louis Brandeis
C) Morton Levine
D) Judith Jarvis Thomson
E) Samuel Warren
سؤال
When information collected for one purpose is put to another purpose, that is called a of the data.
سؤال
Privacy advocates have criticized Path, Twitter, Foursquare, and Instagram for producing apps that .
سؤال
are companies that combine information gathered online with offline information to create customized mailing lists for targeted direct mail.
سؤال
Thanks to , you can get a credit card from a bank or store with which you have never done business.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Information Privacy
1
An RFID is

A) a magnetic bar code.
B) a microscopic bar code.
C) a wireless transmitter.
D) a biometric identification device.
E) a random field interferometry device.
C
2
The OnStar system allows

A) a vehicle owner to initiate a conversation with an OnStar representative.
B) the vehicle to automatically send a message to an OnStar representative after an accident.
C) an OnStar representative to disable the gas pedal of the vehicle without the driver's permission.
D) a and b
E) a, b, and c
E
3
An example of a public record is

A) a birth certificate.
B) a marriage license.
C) a deed to a house.
D) a record of a criminal conviction.
E) All of the above
E
4
The Third Amendment to the United States Constitution has to do with

A) freedom of speech and religion.
B) search warrants.
C) the right to bear arms.
D) quartering of soldiers in private homes.
E) self-incrimination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
5
The process of searching through many records in one or more databases looking for patterns or relationships is called

A) credit reporting.
B) data mining.
C) information gathering.
D) microtargeting.
E) pattern matching.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
6
Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a

A) Constitutional right.
B) legal right.
C) natural right.
D) prudential right.
E) social right.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
7
A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called

A) fair use.
B) full disclosure.
C) nondisclosure.
D) opt-in.
E) opt-out.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
8
Who wrote an influential paper in the 1890s urging that privacy rights be enacted into law?

A) Benn and Brandeis
B) Benn and Thomson
C) Levine and Benn
D) Thomson and Warren
E) Warren and Brandeis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
9
The practice of mailing advertisements only to the most likely prospects is called

A) discriminatory mailing.
B) focused mailing.
C) mail list trimming..
D) predatory mailing.
E) targeted direct mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
10
Manufacturers are replacing bar codes with because they give more information about the product and are easier to scan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
11
When information collected for one purpose is put to another purpose, that is called a

A) backdoor exploit.
B) collaborative filter.
C) cookie.
D) data leveraging opportunity.
E) secondary use of the data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
12
Flash cookies are controversial, in part, because

A) they are commonly used by identify thieves to steal credit card numbers.
B) they consume huge amounts of hard disk space.
C) they allow online retailers such as Amazon.com to track online shopping on other Web sites.
D) they are not controlled by the privacy controls of most Web browsers.
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
13
A is a file containing information about your visits to a Web site that is placed on your computer's hard drive by a Web server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
14
suggested that we do not have to define privacy rights because every "privacy right" violation is a violation of another right as well.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
15
With enhanced 911 service, cell phone providers are able to of active cell phone users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
16
A public record contains information about an incident or action reported to a government agency for the purpose of

A) enhancing public safety.
B) informing the public.
C) protecting the innocent.
D) regulating the economy.
E) upholding the law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
17
The process of searching through one or more databases, looking for patterns or relationships, is called .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
18
In 1890 Harvard-trained lawyers wrote a highly influential article in the Harvard Law Review stating that people in modern society have a right to privacy and that this right ought to be respected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
19
A contains information about an incident or action reported to a government agency for the purpose of informing the public.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
20
Who wrote that every violation of a "privacy right" is also a violation of another right?

A) Stanley Benn
B) Louis Brandeis
C) Morton Levine
D) Judith Jarvis Thomson
E) Samuel Warren
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
21
When information collected for one purpose is put to another purpose, that is called a of the data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
22
Privacy advocates have criticized Path, Twitter, Foursquare, and Instagram for producing apps that .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
23
are companies that combine information gathered online with offline information to create customized mailing lists for targeted direct mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
24
Thanks to , you can get a credit card from a bank or store with which you have never done business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.