Secrecy means that we can share the personal information of an individual with anyone. -Technology

1 Answer

Answer :

FalseSecrecy means we should share the personal information of an individual only with authorised persons.

Related questions

Description : Why do people have such a problem with Apple's secrecy?

Last Answer : I’m not aware that the complaints are about secrecy. The complaints I hear are about overcontrol of app writers, business partners, proprietary formats, closed systems, etc.

Description : Encryption is required to (i) protect business information from eavesdropping when it is transmitted on internet (ii)efficiently use the bandwidth available in PSTN (iii) to protect information stored in companies' databases from ... a. i and ii b. ii and iii c. iii and iv d. i and iv

Last Answer : d. i and iv 

Description : ……………….. are collections of information for individual items. -Technology

Last Answer : Records are collections of information for individual items.

Description : If you were sworn to secrecy but that secret could save the world, would you tell anyone?

Last Answer : I’m afraid I’m not one of those people… I’d end up telling. But I’d be sure to tell it anonymously. ;)

Description : Does anyone have to go through the annoying chat room secrecy with thier spouse/gf/bf/partner?

Last Answer : Talk to her, not us.

Description : For the individual employee, MBO provides: (a) Specific personal performance objectives. ; (b) Communication between co-workers. (c) A means to an end. (d) A way to keep the company accountable.

Last Answer : (a) Specific personal performance objectives. ; 

Description : What if there was a professional librarian position that required a vow of secrecy equivalent attorney/client privilege?

Last Answer : answer:So I’m not supposed to tell anyone else what you are studying? Well, in my case, it would hurt the acquisition of knowledge. I couldn’t network people any more. I’d probably become pretty useless.

Description : Given the possibility that aliens have been seen as in the case of Chicago O'Hare Airport UFO sighting, Why haven't aliens made contact with us? Why all the secrecy? Are aliens afraid of us?

Last Answer : I’d be afraid of us!

Description : "Safe Haven" laws: good or promoting secrecy and usurping parental rights?

Last Answer : Face it, not all families are warm, nurturing, reasonable, open, etc. In an ideal world, sure parents should have knowledge of what their children are doing, but in reality its not always the best idea. ... . Fact is, you can't always trust relatives. (This is different than family, in my opinion.)

Description : Why the Ministers are required to take the oath of secrecy? -SST 10th

Last Answer : The Ministers are required to take the oath of secrecy before entering upon their office because it imposes a Constitutional obligation upon them not to disclose any Cabinet secret.

Description : What flower is the symbol of secrecy?

Last Answer : Rose

Description : It occurs to me that the customer of a pharmacy with a loyalty card has various advantages, but he also has a folder from which even fairly confidential data can be read. Is the data inaccessible and secret?

Last Answer : Of course. They are not allowed to provide information about who takes the medication.

Description : How does a company the size of Microsoft communicate innovation ideas to its workforce while maintaining secrecy about these new product opportunities?

Last Answer : Need answer

Description : The choice of communication partners is influenced by factors of (A) Proximity, utility, loneliness (B) Utility, secrecy, dissonance (C) Secrecy, dissonance, deception (D) Dissimilarity, dissonance, deviance

Last Answer : (A) Proximity, utility, loneliness

Description : What flower is the symbol of secrecy

Last Answer : Rose

Description : Pronita is a programmer in an institution and is asked to handle the records containing personal information -Technology

Last Answer : Suggested five fields are as follows:1. TCode -> To store the code of the teachers.TName -> To store the name of the teachers.TSubject -> To store the name of subjects for which the teacher is placed ... TCode is most likely to be the key field because it has a unique value for each of the records.

Description : Spyware is a type of malware but is not capable of collecting personal information. -Technology

Last Answer : False Spyware is a type of malware used to collect personal information without his or her knowledge.

Description : Privacy deals with personal information. Explain the meaning of term personal information. -Technology

Last Answer : Personal information is the information that identifies you or could identify you.e.g. your name and address.

Description : Internet uses generate large amount of personal information, information thefts and information technology piracy. -Technology

Last Answer : TrueInternet uses generate large amount of personal information, information thefts and information technology piracy.

Description : Computer connected with LAN (a) work fast (b) online (c) can E_mail (d) can share information or peripheral devices -Technology

Last Answer : (d) Computer connected with LAN can share information or peripheral devices.

Description : Intellectual property right means that the person who produces the information is the only one who can use that information. Now, -Technology

Last Answer : The intellectual property rights must be protected because protecting them:1. encourages individuals and business to create new software and new software applications, as well as improving existing ... new ideas and technologies are widely distributed.3. promotes investment in the national economy.

Description : The tag is used to specify the individual table data in a table. (a) (b) -Technology

Last Answer : (b)The tag is used to specify the individual table data in a table.

Description : When the Edit Individual Documents option is selected, how does each letter appear in the new document created after the merge? -Technology

Last Answer : (b) When the Edit Individual Documents option is selected, separate sections for each letter appear in the new document created after the merge.

Description : State one advantage of video conferencing over personal face_to face business meetings. -Technology

Last Answer : Video conferencing allows you to interact with many people face-to-face without being at the same place.

Description : Which type of software is designed to perform specific, personal, business or scientific processing tasks? (a) System (b) Application -Technology

Last Answer : (b) Application software is a computer software which is designed to help the user to perform some specific or personal tasks.

Description : devices at home which included a smartphone, a laptop and a personal computer. What type of network he would be setting up for the same? 1. PAN -Technology

Last Answer : Manoj would be setting up a PAN (Personal Area Network) which is best suited for setups involving a computer, a cell phone and/or a handheld computing device such as a PDA.

Description : What do you think when a company says they never sell or share your personal information with third parties? Do you trust them?

Last Answer : I don’t trust it unless I know something about the company and how trustworthy they are. I believe my bank, for example. I wouldn’t trust a company that sold gimmicky items and offered big discounts.

Description : Which among the following is correct features about LAN (Local Area Network): a) LANs are small size networks which only covers a few buildings or a campus up to few kilometers. b) LANs are widely used to connect ... to share printers in a Lab or in a department. d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : The time_sharing operating system allows multiple programs share the computer resources simultaneously. -Technology

Last Answer : TrueIn time-sharing OS, a small amount of time is allocated for the processing simultaneously.

Description : Unauthorized communication of information means and include:- a) To which he is not authorized to have access. b) Which he is not authorized to keep in his personal custody c) Both A & B d) None of these

Last Answer : c) Both A & B

Description : OS' computer abbreviation usually means ? -Technology

Last Answer : OS computer Abbreviation usually means OPERATING SYSTEM. An Operating system is an integrated set of programs that are used to manage the various resources and overall operations of a computer system.

Description : Downloading of files means transferring files from host computer to the Internet. -Technology

Last Answer : False Downloading of files means transferring of files from an Internet to your computer.

Description : The tag is an ………… tag, that means it has no closing tag. -Technology

Last Answer : The tag is an emptytag, that means it has no closing tag.

Description : ……………. means that a printed document is exactly a copy of what you see on screen. -Technology

Last Answer : WYSIWYGmeans that a printed document is exactly a copy of what you see on screen.

Description : Valid XML document means -Technology

Last Answer : (c) Valid XML document checks errors and has DTD or schema and compiles to it.

Description : Well_formed XML document means -Technology

Last Answer : (d) Well-formed XML document must contain one or more elements and root element must contain all other elements.

Description : Name two other means of online security measures. -Technology

Last Answer : Digital signature and Digital certificate

Description : Word wrapping means (a) the text remains in the straight line -Technology

Last Answer : (b) Word wrapping distributes the text in multiple lines.

Description : Cell address $5 in a formula means (a) it is a mixed reference -Technology

Last Answer : (b) $ sign in a formula need to add before row number and column letter for absolute referencing.

Description : Valid XML document means (a) The document has one root element -Technology

Last Answer : Valid XML document meansThe document has a DTD and complies to it

Description : NULL value means : (i) 0 value (ii) 1 value (iii) None value (iv) None of the above -Technology

Last Answer : Correct option (d) None value

Description : How do you counter the argument that capitalism is a system whereby the individual is incentivized to place personal gain above the public interest?

Last Answer : “How do you counter the argument…” You can’t.

Description : The personal secretary must be an individual.

Last Answer : Justify the following statement : The personal secretary must be an individual.

Description : If rubber goods are tested and inspected in house, the individual or individuals performing the tests must NOT test and certify their own personal protective equipment.?

Last Answer : True.

Description : Which of the following is a personal characteristic that reflects the  truthfulness of an individual that can be checked against observable facts? Select one: a. Objective credibility b. Attribution ... c. Non-manipulative trust d. High cost of lying e. Acknowledgment of munificence

Last Answer : a. Objective credibility

Description : INTRA-PERSONAL COMMUNICATION INVOLVES a) An individual talking to a group b) An individual communicating to a large number of people c) An individual thinking or talking to himself d) An individual talking to another individual

Last Answer : c) An individual thinking or talking to himself

Description : Describe a time when you took personal accountability for a conflict and initiated contact with the individual(s) involved to explain your actions.

Last Answer : This question is designed to see how you handle conflict and to see whether you can move beyond it. The company also wants to know that you can take accountability and responsibility and not put it on someone else.

Description : Of the following terms, which is used to refer to the period of time during which mourning a loss takes place? a) Bereavement Bereavement is the period of time during which mourning ... interdisciplinary care and services provided primarily in the home to terminally ill patients and their families.

Last Answer : a) Bereavement Bereavement is the period of time during which mourning a loss takes place.

Description : _________________ is direct communications with carefully targeted individual consumers to obtain an immediate response. A. Personal selling B. Public relations C. Direct marketing D. Sales promotion

Last Answer : C. Direct marketing