The _____ regulates how Web sites can collect information from minors and communicate with them.

A. ?Children's Online Privacy Protection Act
B. ?Child Online Protection Act
C. ?Children's Internet Protection Act
D. ?Child Identity Theft Protection Act


Answer: A

Computer Science & Information Technology

You might also like to view...

A SYN flood is characterized by the brute force transmission of requests for access to the target network, with the aim of overwhelming its capacity to receive them.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ is a form of legal protection for authors of original works.

A. Copyright B. Domain protection C. Trademark D. Both a and c

Computer Science & Information Technology

A new mail merge can be completed by creating a new data source or using an existing data source.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Match the term with the correct item below. (Not all Terms are used.)

A. A _______________ is provided to a potential employer to assist in checking your qualifications. B. C. A resume in a Word document attached to an e-mail is an example of a(n) __________. D. A keyword search uses  __________ to match keywords. E. F. G. H. To determine the specific qualifications required for a job that is available, review the  __________. I. A(n) __________ is used to determine which companies may be the best prospects for your job search. J.

Computer Science & Information Technology