Use of a computer for unauthorized access to information about a customer, patient, or student is called ____.
A. waste of resources
B. an ergonomic problem
C. piracy
D. invasion of privacy
Answer: D
You might also like to view...
How many activities exist within the BSIMM?
A. 56 B. 78 C. 111 D. 156
What tab should a CentOS 7 administrator use in System Monitor to view the usage history of their system's swap memory?
A. Resources tab B. Processes tab C. Memory tab D. File System tab
In database terminology, a link between two tables is called a(n) ____.
A. active join B. relationship C. import D. export
While the concept of privacy has been debated by the courts and legal systems for nearly two centuries, the strongest definition of the concept came about when The Privacy Act was passed. This happened in the year _______.
a. 1916 b. 1974 c. 1986 d. 1888