The individual’s right to privacy deals mainly with information. What are the other things covered under this right? -Technology

1 Answer

Answer :

The right to privacy involves the decisions pertaining to questions like what information about one’s self or one’s associations must a person reveal to others , under what conditions and with what safeguards. What things can people keep to them and not be forced to reveal to others?

Related questions

Description : Why is individual’s right to privacy important in today’s world? -Technology

Last Answer : Recent advances in information technology threaten privacy and have reduced the amount of control over personal data and open up the possibility of a range of negative consequences as a result of ... databases, there is an endless opportunity for thieves to retrieve it and misuse the information.

Description : Privacy deals with personal information. Explain the meaning of term personal information. -Technology

Last Answer : Personal information is the information that identifies you or could identify you.e.g. your name and address.

Description : Identify the option, which is not a feature covered under device management? (a) Speed (b) Spooling (c) Sharing (d) Programming -Technology

Last Answer : (d) Among given options, programming is not a feature covered under device management.

Description : ……… is not covered under file management. (a) Secure files (b) Easy access to files (c) Schedule processes (d) Keep backup of files -Technology

Last Answer : (c) Because schedule processes comes under processor management.

Description : “Internet can affect the privacy rights of a person.” Comment. -Technology

Last Answer : A person's Internet usage and transactions done by him/her online provides a large amounts of information which provides insight into that person's interests and other vital information about the person ... , a person with malicious intent can easily invade in some other person's privacy online.

Description : An incidental use or disclosure is not a violation of the HIPAA Privacy Rule if the covered entity (CE) has:?

Last Answer : all the above

Description : Which of the following subject area deals with pay-as-you-go usage model? a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Accounting Management

Description : How many issues of information technology are covered under section 7 of the law ?

Last Answer : Section 8 of the Act covers 20 subjects of information technology.

Description : Which Act in India focuses on data privacy and information technology? a. IT(ammendment)Act 2008 b. Indian Penal code c. IT Act 2000 d. None of these

Last Answer : c. IT Act 2000

Description : Which Act in India focuses on data privacy and information technology? a. IT(ammendment)Act 2008 b. Indian Penal code c. IT Act 2000 d. None of these

Last Answer : c. IT Act 2000

Description : Right to Privacy comes under – (1) Article 19 (2) Article 20 (3) Article 21 (4) Article 18

Last Answer : (3) Article 21 Explanation: The Indian constitution does not expressly recognize the right to privacy. But after the case of Kharak Singh vs. State of U.P (1963), the Supreme Court for the first time recognized the ... ); R. Rajagopat vs. State of Tamil Nadu (1994); PUCL, v. Union of India (1997).

Description : Right to Privacy is protected as an intrinsic part of Right to Life and Personal Liberty. Which of the following in the Constitution of India correctly and appropriately imply the above statement? (1) ... in Part. III (4) Article 24 and the provisions under the 44th Amendment to the Constitution

Last Answer : (3) Article 21 and the freedoms guaranteed in Part. III Explanation: The Supreme Court ruled that "the right to privacy is protected as an intrinsic part of the right to life and personal ... the Janata Government mainly to nullify some of the amendments made by the 42nd Amendment Act, 1976.

Description : The most appropriate option for the term “Public Health” is: A A. Deals about the health of a community B. Deals with the individuals  C. Deals with the physical and psychological well-being D. Deals with the productivity of a population

Last Answer : Deals about the health of a community

Description : The most appropriate option for the term “Public Health” is: A A. Deals about the health of a community B. Deals with the individuals  C. Deals with the physical and psychological well-being D. Deals with the productivity of a population

Last Answer : Deals about the health of a community

Description : Pyramid of numbers deals with number of (a) species in an area (b) individuals in a community (c) individuals in a trophic level (d) subspecies in a community.

Last Answer : (c) individuals in a trophic level

Description : What will the be the social and privacy ramifications now that video calling is becoming a reality?

Last Answer : Same argument/question when the cell-phone showed up.

Description : What are some good arguments for privacy?

Last Answer : answer:Not everyone wants to see your….parts. Especially if you be fat or old. Privacy solves this. And then privacy Myspace stalkers from accessing the fourteen year olds…

Description : Which of the following statement is false (a). Enzymes are differentiated by electrophoresis method (b). While DNA sequencing both forward and reverse primers are used (c). Amplification is done through PCR (d). ABO blood grouping is mainly used for differentiating individuals

Last Answer : Ans: (b). While DNA sequencing both forward and reverse primers are used 

Description : Which among the following deals with that branch of agricultural economics which is mainly about the business principles and interests of farming? a. Agriculture management b. Business management c. Economy management d. Farm management

Last Answer : d. Farm management

Description : Which among the following deals with that branch of agricultural economics which is mainly about the business principles and interests of farming? a. Agriculture management b. Business management c. Economy management d. Farm management

Last Answer : d. Farm management

Description : Intellectual property right means that the person who produces the information is the only one who can use that information. Now, -Technology

Last Answer : The intellectual property rights must be protected because protecting them:1. encourages individuals and business to create new software and new software applications, as well as improving existing ... new ideas and technologies are widely distributed.3. promotes investment in the national economy.

Description : True or False "Use" is defined under HIPAA as the release of information containing PHI outside of the covered entity (CE).?

Last Answer : FALSE

Description : What, in your opinion, is the impact of digital download on individuals and organizations and society as a whole?

Last Answer : I think the impact is nothing but positive as the speed of important information distribution increases dramatically.

Description : A Privacy Impact Assessment (PIA) is an analysis of how information is handled?

Last Answer : All of the above

Description : A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the ... of the information for analysis. D. The frequency of a particular item occurring in a data set.

Last Answer : D. The frequency of a particular item occurring in a data set.

Description : Which of the following is not a dimension of privacy? a. Need for personal space b. Need to feel in control of our possessions c. Need to feel in control of our personal information d. All of the above are dimensions of privacy

Last Answer : d. All of the above are dimensions of privacy

Description : OnStar technology has violated the privacy of some people by?

Last Answer : keeping records of their whereabouts.

Description : Do children have a right to privacy?

Last Answer : everyone has a right to privacy. but, obviously, a child’s privacy should be limited (somewhat) by the parents. there has to be a good balance for everything in life

Description : What Precedent Suggests if Financial Privacy is a Basic Human Right?

Last Answer : I know from precedent that privacy is. I can tell you a secret in my home while probable cause is needed to enter one's home. We figured that one out eventually in the physical world & are beginning ... Make me think & help me be better informed. There is no better place online for this than .

Description : Right to privacy as a Fundamental Right is implied in - (1) Right to Freedom (2) Right to Life and Personal Liberty (3) Right to Equality (4) Right against Exploitation

Last Answer : (2) Right to Life and Personal Liberty Explanation: "Right to Privacy is an integral part of Right to Life and Personal Liberty guaranteed in Article 21 of the Constitution," the SC's nine ... added that the right to privacy is intrinsic to the entire fundamental rights chapter of the Constitution.

Description : Point out which from the following is not a right enumerated in the Constitution of India but has been articulated by the Supreme Court to be a Fundamental Right. (1) Right to privacy (2) Equality before law (3) Abolition of untouchablity (4) Right to form associations or unions

Last Answer : (1) Right to privacy Explanation: Judicial activism has brought the Right to Privacy within the realm of Fundamental Rights. The Supreme Court of India has construed "right to privacy" as a part of ... conceive to be their duty must strictly and scrupulously observe the forms and rules of the law".

Description : Right to Privacy is included in which article of Indian constitutions? a. Article 21 b. Article 12 c. Article 15 d. Article 25

Last Answer : a. Article 21

Description : Right to privacy as a Fundamental Right is implied in (A) Right to Freedom (B) Right to Life and Personal Liberty (C) Right to Equality (D) Right against Exploitation

Last Answer : (B) Right to Life and Personal Liberty

Description : Article 368 of the Indian Constitution deals with – (1) Emergency Provisions (2) Right to Primary Education (3) Right to Information (4) Amending Procedure

Last Answer : (4) Amending Procedure Explanation: Article 368 of the Constitution of India deals with the amendment process. It empowers Parliament to amend the Constitution by way of addition, variation or ... to the procedure laid down therein, which is different from the procedure for ordinary legislation.

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : Which of the following statements is a wrong statement under Value Chains ? A. Technology development is a support activity B. Marketing & Sales is a support activity C. Operations are ... Inputs into Final Product or Service D. Procurement is a support activity which deals with Vendors

Last Answer : Marketing & Sales is a support activity

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : Information and other resources can be modified only by those users, -Technology

Last Answer : Security and Integrity of information ensures that information and other resources are modified only by those users, who have the authority of making changes in the data.

Description : What field of philosophy, not science, deals with things other than matter and energy?

Last Answer : Metaphysics

Description : Which one of these refers to all objects that have sensors,network connectivity,software,and so on to connect to the network ? :- a) Internet of Things b) Artificial Intelligence c) Machine Learning d) Deep Learning -Technology

Last Answer : internet of things is the correct answer option a

Description : “““.are 'attempts by individuals toobtain confidential information from you by falsifying their identity. (A) Phishing (B) Computer viruses (C) Spyware scams (D) Viruses (E) None of the above

Last Answer : Phishing

Description : A change in an individual's behavior prompted by information and experience is called 1. learning 2. role selection 3. perception 4. inculturation 5. motivation

Last Answer : learning

Description : _____are attempt by individuals to obtain confidential information from you by falsifying their identity: a) Phishing Trips b) Computer Viruses c) Spyware Scams d) Viruses e) Phishing Scams

Last Answer : a) Phishing Trips

Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1) Phishing trips 2) Computer viruses 3) Spyware scams 4) Phishing Scams

Last Answer : 4) Phishing Scams

Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1 Phishing trips 2 Computer viruses 3 Spyware scams 4 Phishing Scams

Last Answer : 4 Phishing Scams

Description : In one corner of its magazine advertisement for office copiers, Pitney Bowes places a small box asking for the names and addresses of individuals or companies seeking more information. Pitney has ... facilitate ______ for this communication. A)decoding. B)feedback. C)encoding. D)noise reduction.

Last Answer : D)noise reduction.

Description : Which of the following is the MAIN advantage of multivariable segmentation: A)provides more information about the individuals in each segment B)allows the company to develop a marketing mix that will ... a larger number of segments D)allows more than one variable to be used to segment markets

Last Answer : B)allows the company to develop a marketing mix that will satisfy customers in a segment more precisely

Description : A change in an individual's behaviour prompted by information and experience is called: A)learning. B)role selection. C)perception. D)inculturation. E)motivation.

Last Answer : A)learning.

Description : One who disclose information to public of a company, organization, firm, government and private agency and he/she is the member or employee of that organization; such individuals are termed as ___________ a) Sponsored hackers b) Crackers c) Hactivist d) Whistleblowers

Last Answer : d) Whistleblowers