Which of the following companies was directed by the Federal Trade Commission ("FTC") to implement a comprehensive information security program for allegedly carrying out a deceptive trade practice with respect to its Passport web service?

A. Google
B. Microsoft
C. Gateway Learning
D. GeoCities


B. Microsoft

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. The expression array.GetUpperBound(1) can be used to determine the upper bound of a one-dimensional array. 2. Often, the elements of an array represent a series of related values that are used in a calculation. 3. Values in an array can be totaled by using the ArrayTotal method. 4. Arrays can be used as sets of counters. 5. When an expression contains nested parentheses, its evaluation begins with the value in the outermost set of parentheses.

Computer Science & Information Technology

We can trace the execution of a comparison-based algorithm by using a graph called a ____.

A. pivot table B. partition table C. comparison tree D. merge tree

Computer Science & Information Technology

RTF does not support which feature?

A. Font definitions B. Auto updated calculated fields C. Standard alignment options D. Basic formatting, such as bold and italics

Computer Science & Information Technology

If you are not concerned with replacing outdated image files, you should cloak the ____ folder of a website to save time when synchronizing files.

A. root B. parent C. child D. assets

Computer Science & Information Technology