Tomas is reviewing a job application form. Information on gender is requested, but so far as he knows this isn’t taken into account anywhere in the hiring process. This is an example of a violation of the law of ____
a.
Conservation of information
b.
Utilization of information
c.
Logical data flow
d.
Data integrity
b.
Utilization of information
Collecting information or data that is not used is inefficient and wasteful of resources and can lead, later, to security threats.
Computer Science & Information Technology
You might also like to view...
This device is used to route data that needs to exit the LAN.
What will be an ideal response?
Computer Science & Information Technology
Which is the best example of a naming convention for a pointer?
A. pVar B. pointer_to_var C. *pVar D. Conventions are a waste of time.
Computer Science & Information Technology
If a Web address uses a secure protocol, it will begin with ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
The AVERAGE function can be used to calculate the student class average or a quiz or exam
Indicate whether the statement is true or false
Computer Science & Information Technology