Ed is tasked with protecting information about his organization's customers, including their name, Social Security number, birthdate, and place of birth, as well as a variety of other information. What is this information known as?

A. PHI
B. PII
C. Personal Protected Data
D. PID


Answer: B. PII

Computer Science & Information Technology

You might also like to view...

Which CSS property configures the capitalization of text?

a. font-type b. text-transform c. text-decoration d. font-weight

Computer Science & Information Technology

When creating a table using the New Excel Spreadsheet command, how does the content display?

A) Embedded Excel worksheet B) Table C) Lotus workbook D) An attached file

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 16-2Jill is starting a fast food delivery company. She has designed a logo and plans to print flyers to advertise her services. Jill has poor eyesight. When proofreading her book, she can use a ____ that will read aloud whatever she has typed.

A. screen reader B. Braille keyboard C. head mouse D. switch

Computer Science & Information Technology

The ____ is the main telecommunications line through the network, connecting the major router sites across the country.

A. ?star topology B. ?ARPANET C. ?mid-level network D. ?backbone

Computer Science & Information Technology