Skip to main content

Flash Cards - #2017

Which of the following statements is true regarding data privacy laws?

No European country has a unified data privacy law at the national level.

The United States has a unified data privacy law at the national level.

The Health Insurance Portability and Accountability Act (HIPAA) only protects consumers in a single industry.

The Gramm-Leach-Bliley Act (GLBA) protects consumers in all industries.

1.      States with no security breach law include:

New York, Ohio, and Pennsylvania.

Alabama, New Mexico, and South Dakota.

Illinois, Indiana, and Michigan.

California, Colorado, and Kansas.

1.      Mississippi’s security breach law is:

Miss. Code § 23-62-31.

Miss. Code § 51-42-19.

Miss. Code § 75-24-29.

Miss. Code § 82-71-13.


1.      Which of the following statements is true regarding codified law?

A whole section might exist simply to explain a single prior word.

It is not specific when it comes to the definition of particular words.

Definitions for particular words are provided in a glossary at the end of the law.

Definitions of particular words are unimportant.


1.      The best approach to reading codified law is to be aware of the __________ to know when you are going deeper into a definition or rising back out of one.

section

numbering

previous laws

timeframe of the drafting of the law
10 points    
Question 6
1.      Codified law is very structured and organized, laid out logically in nested divisions just as:

a software developer would develop “code.”

a surveyor would map a geographic area.

an artist would paint a portrait.

a musician would write a musical score.

1.      Each Title, Chapter, Part, Section, Paragraph, and Clause:

can be considered separate laws.

is independent of one another.

can be broken into subdivisions.

is complete with no subdivisions.


1.      Virginia law 32.1-127.1:05 provides a detailed definition of:

“financial information.”

“medical information.”

“credit card information.”

“accounting practices.”


1.     
Delaware’s security breach law is:

Del. Code tit. 6, § 12B-101 et seq.

Del. Code tit. 7, § 13B-102 et seq.

Del. Code tit. 8, § 14B-103 et seq.

Del. Code tit. 9, § 15B-101 et seq.


1.      Laws are broken down into increasingly narrow divisions starting from the top as Titles, Chapters, Parts, Sections, Paragraphs, and down to Clauses to provide the reader with:

vague and evolving definitions of a broad topic.

vague and evolving definitions of a narrow topic.

clearer and clearer definitions of a broad topic.

clearer and clearer definitions of a narrow topic.

1.      The purpose of the __________ is, according to its Web site, to provide “access to current state and federal legislation and a comprehensive list of state documents, including state statutes, constitutions, legislative audits, and research reports.”

Federal Trade Commission (FTC)

National Conference of State Legislatures (NCSL)

The Gramm-Leach-Bliley Act (GLBA)

The State Documents Commission (SDC)

1.      Virginia’s law 32.1-127.1:05 was signed in:


1990.

2000.

2010.

2015.

1.      The National Conference of State Legislatures (NCSL) Web site tracks and organizes __________ state legislation.

banking and financial

health care

accounting and securities exchange

telecommunication and information technology

1.      Arizona’s security breach law is:

Ariz. Rev. Stat. § 33-6490.

Ariz. Rev. Stat. § 44-7501.

Ariz. Rev. Stat. § 55-8612.

Ariz. Rev. Stat. § 66-9723.

1.      Currently, __________ states, the District of Columbia, Guam, Puerto Rico, and the Virgin Islands have data and security breach notification laws that define what organizations must do if they have had data or security breached that impact citizen privacy data.

47

48

49

50

1.      Which of the following statements is true?

Statutory law is usually written in a narrative form.

Statutory law is rarely structured or formulaic.

Legal text is easy to understand.

Legal text is jokingly known to be challenging to read.

1.      Virginia has __________ breach notification law(s).

zero

one

two

three

1.      Which of the following statements is true regarding what happens when a company discovers its data has been compromised?

Without an overarching federal mandate in effect, the company is not compelled to notify all the affected individuals.

The GLBA requires the company to notify the affected individuals regardless of the company’s industry.

HIPAA prohibits the company from notifying the affected individuals unless the data compromise might endanger the health of the individual.

Few states have enacted their own privacy laws that would require the company to notify the affected individuals.

1.      Which of the following statements is true regarding Virginia’s law 32.1-127.1:05?

It is identical to HIPAA.

It is unrelated to HIPAA.

It is relevant in all states to those entities that are not already covered by HIPAA.

It is relevant in the state of Virginia to those entities that are not already covered by HIPAA.

1.      Virginia’s law 32.1-127.1:05 is specific to:

banking.

health care.

retail.

publicly traded organizations.




1.      If you design a graphic, slogan, or symbol for your company and its product, then you would file for a(n):

trademark.

copyright.

patent.

exception.

1.      Which of the following is an example of intellectual property?

Artwork that an individual created.

A house that one individual purchased from a previous owner who did not design the house.

Land that one individual purchased from a previous owner.

A car that one individual purchased from a previous owner who did not design the car.

1.      For more than 200 years prior to March 2013, a patent was awarded to the:


company that produces the invention.

person with the best idea for a product or process.

person who first came up with the invention.

person who files first for the patent.

1.      The Digital Millennium Copyright Act addresses treaties signed in 1996 at the:

World Intellectual Property Organization (WIPO) Geneva conference.

World Music Organization (WMO) London conference.

World United Songwriters Association (WUSA) Nashville conference.

We Are the World concert.

1.      RIAA claimed that Napster made a(n):

“indirect” infringement on its patent.

“direct” infringement on its trademark.

“direct” infringement on its copyright.

“indirect” infringement on its copyright.

1.      Which of the following legal terms means assisting in or inducing people to engage in infringement activity?


Material contribution

Principal use

Substantial use

Probable cause

1.      In December 1999, the Recording Industry Association of America (RIAA) took legal action against Napster for:

copyright infringements.

patent infringements.

trademark infringements.

identity theft.

1.      If you write a song, produce a film, sculpt a piece of art, or write a mobile phone application and wish to protect it, then you will claim a(n):

trademark.

copyright.

patent.

exception.



1.      Which of the following supported the Digital Millennium Copyright Act?

Librarians

Academics

Scientists

Software and entertainment industries

1.      To help protect intellectual property, the United States used established treaties from __________ to extend its own copyright law in the online realm.

the European Union (EU)

the National Conference of State Legislatures (NCSL)

Napster

the World Intellectual Property Organization (WIPO)

1.      RIAA, the plaintiff, represented __________ in its legal action against Napster.

Bruce Springsteen and Billy Joel

the Black Keys

the Smashing Pumpkins

all major record labels

1.      The primary difference between a copyright, a trademark, and a patent is the:

profession of the individual applying for intellectual property protection.

industry in which the intellectual property is used.

type of intellectual property being protected.

length of protection the intellectual property owner desires.

1.      Under the Digital Millennium Copyright Act, which of the following are protected from copyright infringement liability for the act of transmitting information over the Internet?

Libraries

Higher education institutions

Internet service providers

Individuals

1.      The law that stopped Napster from continuing its operations is the __________ that was enacted in 1998.

Napster Act (NA)

Digital Millennium Copyright Act (DMCA)

Intellectual Property Act (IPA)

Gramm-Leach-Bliley Act (GLBA)

1.      Since March 2013, a patent is awarded to the:

company that produces the invention.

person with the best idea for a product or process.

person who first came up with the invention.

person who files first for the patent.


1.      The Digital Millennium Copyright Act makes it a crime to:


crack copyright protection devices to assess product interoperability.

crack copyright protection devices for the purpose of testing security systems.

crack copyright protection devices for the purpose of encryption research.

circumvent antipiracy measures in commercial software.
1.      Which of the following was a company (in existence only from June 1999 to July 2001) that used peer-to-peer networking to provide a file-sharing service that gave its users the ability to share music?

iTunes

Napster

Soundz

Pandora

1.      If you invent a machine or design a special process, you may wish to file for a(n):

trademark.

copyright.

patent.

exception.



1.      Under the Digital Millennium Copyright Act, which of the following must pay licensing fees to record companies?

Libraries

“Webcasters”

Higher education institutions

Nonprofit “public” radio stations

1.      The result of the United States copyright extension is now known as the:


Napster Act (NA).

Digital Millennium Copyright Act (DMCA).

Intellectual Property Act (IPA).

Gramm-Leach-Bliley Act (GLBA).

The courts have ruled in favor of using reverse engineering

enable interoperability

Comments

  1. Thank you so much my friend. Please let us know if there's anything we can help from our side. Your service is really amazing. Thank you again

    ReplyDelete

Post a Comment

Popular posts from this blog

Team Management Discussion 10

The Stryker and Santoro (2012) article supports the value of face-to-face communication within teams.  As you know, improved technology has introduced many diverse communication and collaboration options.  After reading the article and the textbook, reflect and synthesize the following questions. What options have you used?  What would you consider to be the most effective in a localized team environment?  How about in a global team environment? ANS :  There are a few new correspondence innovations which have changed the correspondence media and its utilization in associations and these advancements have supplanted the conventional medium of correspondence i.e., up close and personal correspondence in the greater part of the associations. The development of new advancements at associations is to conquer the disadvantages of vis-à-vis correspondence at the working environment. A portion of the drawbacks connected with the up close and personal correspondence are they are hard to reh

Team Management Discussion 1

According to the Sarin and O’Connor (2009) article, certain style and goal structures of team leaders have a strong influence on internal team dynamics.  Based on your research within the article and textbook, as well as your own experience, what team leader management style would be most effective in leading a team in which you were a member? ANS :  According to Shikhar Sarin and Gina Colarelli O’Connor, they explain these concepts through graph about leader characteristics with goal-path theory. based on a survey of 246 members from 64 new product development (NPD) teams suggest that participative management style according to a hierarchical linear model analysis initiation of the good structure by the team leader. To became a good leader for team members we have different types of theories. every theory has its own style. "  Participative Leadership  " is really good for team members because team leader invites member’s involvement in the decision-making process

All Quiz's Management Information Systems

Which of the following is not a benefit of virtualization? Select one: a. Energy efficient and scalable b. More efficient use of data storage c. Less memory-intensive   d. Lower total cost of ownership Question  2 Correct 1.00 points out of 1.00 Flag question Question text The business architecture describes __________. Select one: a. How specific apps are designed and how they interact with each other. b. How an enterprise’s data stores are organized and accessed. c. The hardware and software infrastructure that supports applications and their interactions. d. The processes the business uses to meet its goals.   Question  3 Correct 1.00 points out of 1.00 Flag question Question text Which of the following is not one of the reasons for information deficiencies? Select one: a. Data silos b. Lost or bypassed data c. Distributed systems   d. Non-standardized data formats Question  4 Correct 1.