A) Safeguarding patients' billing information
B) Protecting patients' computer records
C) Protecting patients' credit information
D) Safeguarding conversations between patients and their families
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Applets
B) Kernels
C) Cookies
D) Firewalls
E) Select
Correct Answer
verified
Multiple Choice
A) Digital computing
B) Soft computing
C) Green computing
D) Cyber computing
E) Select
Correct Answer
verified
Multiple Choice
A) Increasing the speed of the Internet for the information rich
B) Increasing the number of computers in public places
C) Reducing the number of computer equipment at schools
D) Reducing the Internet bandwidth for the information poor
Correct Answer
verified
Multiple Choice
A) Cookies
B) Trojans
C) Applets
D) Kernels
E) Select
Correct Answer
verified
Multiple Choice
A) Uniform Civil Code
B) The Fair Use Doctrine
C) The Copyright Act of 1790
D) IT code of conduct
Correct Answer
verified
Multiple Choice
A) experienced labor is eliminated by high technology.
B) a worker is promoted from a semiskilled to a skilled position.
C) a job is carried out manually.
D) fragmented jobs are combined as a whole.
Correct Answer
verified
Multiple Choice
A) Job virtualization
B) Job upgrading
C) Job deskilling
D) Job rotation
Correct Answer
verified
Multiple Choice
A) for an unlimited period of time.
B) for contents derived from other processes.
C) to upgrade a pre-existing patented process.
D) to keep competitors from entering certain market segments.
Correct Answer
verified
Multiple Choice
A) virus
B) bug
C) spam
D) cookie
E) Select
Correct Answer
verified
Multiple Choice
A) ethical, but illegal
B) legal, but unethical
C) illegal and unethical
D) legal and ethical
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) An identity log file
B) A virtual organization
C) Intellectual property
D) Information policy
E) Select
Correct Answer
verified
Multiple Choice
A) unethical and illegal
B) ethical, but illegal
C) legal and ethical
D) legal, but unethical
Correct Answer
verified
Multiple Choice
A) sniffing
B) phishing
C) cybersquatting
D) spamming
Correct Answer
verified
Multiple Choice
A) regulates work routine
B) reduces employee turnover
C) separates work and home life
D) increases interaction with coworkers
Correct Answer
verified
Multiple Choice
A) legal document that protects an organization from embezzlement of money by its service providers.
B) set of rules to govern the electronic fund transfers between an organization and its clients.
C) legal document that contains an agreement of the issues documented by the health and social issues of pharmaceuticals.
D) set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
Correct Answer
verified
Multiple Choice
A) not delete data even when it is not needed.
B) not modify data once it is entered into an information system.
C) collect only the data that is necessary for the stated purpose.
D) provide unlimited access to personal information to those who have authorization.
Correct Answer
verified
Multiple Choice
A) virtual organization
B) collated organization
C) merged organization
D) pool organization
E) Select
Correct Answer
verified
Showing 61 - 80 of 80
Related Exams