Tom believes that a customer of his Internet service provider has been exploiting a vulnerability in his system to read the email messages of other customers. If true, what law did the customer most likely violate?

A. ECPA
B. CALEA
C. HITECH
D. Privacy Act


Answer: A. ECPA

Computer Science & Information Technology

You might also like to view...

In ____ mode, you do not have to worry about objects overlapping.

a. merge b. object drawing c. destructive d. selection

Computer Science & Information Technology

How do you convert a curve point to a corner point?

What will be an ideal response?

Computer Science & Information Technology

Write a friend function multElements that takes two Matrix input parameters, checks to see if they are the same size (if not, displays a message stating this) and fills a Matrix output parameter with the products of corresponding elements of the two input parameters.

const int MAX_ROWS = 10;
	const int MAX_COLS = 10;

class Matrix {
public:
Matrix()  {}
private:	
int rows;
int cols;
int mat[MAX_ROWS][MAX_COLS];
};

Computer Science & Information Technology

?The Electronic Communications Privacy Act (ECPA) of ____, which was enacted before most people were using the Internet, does not include rules specifically designed to protect the privacy of persons using websites to conduct transactions.

A. ?1981 B. ?1986 C. ?1991 D. ?1996

Computer Science & Information Technology