The National Security Agency's cloud computing program was:
A. designed to control the government's access to personal information on American citizens.
B. initially developed to monitor transactions in banks.
C. initially developed to monitor phone calls in U.S. prisons.
D. designed to collect personal data from the servers of multiple corporations.
E. set up to tackle the menace of online harassment.
Answer: D
You might also like to view...
Although conservatives and liberals both argue otherwise, government policy and public opinion seem to be independent of each other
Indicate whether the statement is true or false
In 2010, the greatest percentage of immigrants to America came from
A. Asia. B. Latin America. C. Australia. D. Europe. E. Africa.
According to the authors of the textbook, under what circumstances will Texas adopt an income tax?
A) When the proportion of retired Texans increases by at least 30 percent B) When the business community decides that an income tax is necessary for the state's economic survival C) When the voters are tired of paying property taxes D) When there is a Democrat in the governor's office, a Democratic lieutenant governor, and a Democratic Speaker of the Texas House E) When there is a confluence of all of the factors listed above
Indirect techniques of influencing government policy can be particularly effective because:
A) they provide a large amount of election support to public officials. B) they require considerably less effort from interest groups than direct methods. C) public officials are often more impressed by contacts from voters than from lobbyists. D) they are better planned than direct lobbying techniques. E) lobbyists demand more benefits than common voters.