Common invasions of privacy resulting from the use of technology include which of the following?
a. Organizations collecting excessive amounts of information for decision making.
b. Employers monitoring the time employees spend on a task.
c. Supervisors reading employees' electronic mail.
d. All of the above.
D
You might also like to view...
A shareholder resolution must be dropped if it is not favored by the management
Indicate whether the statement is true or false
In formatting a report, you discover that an entire table will not fit on the bottom of a page. You should
a. continue the graphic interpretation to the bottom of the page and begin the next page with the table. b. begin the table, allow an adequate margin at the bottom of the page, and complete the table at the top of the next page. c. end the page with the introduction to the table, regardless of space left on the page. d. place the table prior to the text reference to it if that placement will allow the entire table to appear on that page.
CPM stands for Comprehensive Project Method
Indicate whether the statement is true or false
The act of Congress that requires employers to pay men and women the same amount for the same work is called ________.
A. The Equal Opportunity Act B. The Equal Pay Act C. The Work Compensation Act D. Anti-discrimination Act