Privacy deals with personal information. Explain the meaning of term personal information. -Technology

1 Answer

Answer :

Personal information is the information that identifies you or could identify you.e.g. your name and address.

Related questions

Description : The individual’s right to privacy deals mainly with information. What are the other things covered under this right? -Technology

Last Answer : The right to privacy involves the decisions pertaining to questions like what information about one’s self or one’s associations must a person reveal to others , under what conditions and with what safeguards. What things can people keep to them and not be forced to reveal to others?

Description : A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the ... of the information for analysis. D. The frequency of a particular item occurring in a data set.

Last Answer : D. The frequency of a particular item occurring in a data set.

Description : Which of the following is not a dimension of privacy? a. Need for personal space b. Need to feel in control of our possessions c. Need to feel in control of our personal information d. All of the above are dimensions of privacy

Last Answer : d. All of the above are dimensions of privacy

Description : “Internet can affect the privacy rights of a person.” Comment. -Technology

Last Answer : A person's Internet usage and transactions done by him/her online provides a large amounts of information which provides insight into that person's interests and other vital information about the person ... , a person with malicious intent can easily invade in some other person's privacy online.

Description : Why is individual’s right to privacy important in today’s world? -Technology

Last Answer : Recent advances in information technology threaten privacy and have reduced the amount of control over personal data and open up the possibility of a range of negative consequences as a result of ... databases, there is an endless opportunity for thieves to retrieve it and misuse the information.

Description : Which of the following subject area deals with pay-as-you-go usage model? a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Accounting Management

Description : Pronita is a programmer in an institution and is asked to handle the records containing personal information -Technology

Last Answer : Suggested five fields are as follows:1. TCode -> To store the code of the teachers.TName -> To store the name of the teachers.TSubject -> To store the name of subjects for which the teacher is placed ... TCode is most likely to be the key field because it has a unique value for each of the records.

Description : Spyware is a type of malware but is not capable of collecting personal information. -Technology

Last Answer : False Spyware is a type of malware used to collect personal information without his or her knowledge.

Description : Internet uses generate large amount of personal information, information thefts and information technology piracy. -Technology

Last Answer : TrueInternet uses generate large amount of personal information, information thefts and information technology piracy.

Description : Secrecy means that we can share the personal information of an individual with anyone. -Technology

Last Answer : FalseSecrecy means we should share the personal information of an individual only with authorised persons.

Description : Which Act in India focuses on data privacy and information technology? a. IT(ammendment)Act 2008 b. Indian Penal code c. IT Act 2000 d. None of these

Last Answer : c. IT Act 2000

Description : Which Act in India focuses on data privacy and information technology? a. IT(ammendment)Act 2008 b. Indian Penal code c. IT Act 2000 d. None of these

Last Answer : c. IT Act 2000

Description : Care to post a link showing another way that law enforcement and big business are using electronics to eliminate privacy and erode personal liberties in the Western World?

Last Answer : answer:Your Thruway E-Z Pass is being read in other places besides highway toll booths. Shopping malls, parking lots, stores, Town government are buying readers. The readers record the date and time ( ... when your pass is contacted and transmits. Buy one for the office and take turns sharing it.

Description : What are your thoughts and feelings about the intersection of personal privacy and medical treatment?

Last Answer : Everyone is human. I don't trust doctors any more than I trust lawyers, mechanics, strangers, etc etc etc. American society places doctors on an undeserved pedestal. That said, obviously if you need ... a dire emergency. In that case, you probably just have to trust that most people are decent.

Description : When it comes to tabloid photographers and celebrity photographers (think Paparazzi), in regards to someone's personal privacy, just how much intrusion is too much intrusion?

Last Answer : Any unwanted intrusion into a person’s private life it too much.

Description : Should CIA torturers have personal privacy concerning their job performance?

Last Answer : No, they should not. If they actually felt that using torture was in the best interests of our country, why would they want to hide it? The fact that they want to keep it secret is a clear indication that they knew what they were doing was WRONG.

Description : Right to privacy as a Fundamental Right is implied in - (1) Right to Freedom (2) Right to Life and Personal Liberty (3) Right to Equality (4) Right against Exploitation

Last Answer : (2) Right to Life and Personal Liberty Explanation: "Right to Privacy is an integral part of Right to Life and Personal Liberty guaranteed in Article 21 of the Constitution," the SC's nine ... added that the right to privacy is intrinsic to the entire fundamental rights chapter of the Constitution.

Description : Right to Privacy is protected as an intrinsic part of Right to Life and Personal Liberty. Which of the following in the Constitution of India correctly and appropriately imply the above statement? (1) ... in Part. III (4) Article 24 and the provisions under the 44th Amendment to the Constitution

Last Answer : (3) Article 21 and the freedoms guaranteed in Part. III Explanation: The Supreme Court ruled that "the right to privacy is protected as an intrinsic part of the right to life and personal ... the Janata Government mainly to nullify some of the amendments made by the 42nd Amendment Act, 1976.

Description : Right to privacy as a Fundamental Right is implied in (A) Right to Freedom (B) Right to Life and Personal Liberty (C) Right to Equality (D) Right against Exploitation

Last Answer : (B) Right to Life and Personal Liberty

Description : What will the be the social and privacy ramifications now that video calling is becoming a reality?

Last Answer : Same argument/question when the cell-phone showed up.

Description : What are some good arguments for privacy?

Last Answer : answer:Not everyone wants to see your….parts. Especially if you be fat or old. Privacy solves this. And then privacy Myspace stalkers from accessing the fourteen year olds…

Description : What do you understand by the term information? -Technology

Last Answer : When data is processed, organised or presented in a given context, so as to make it useful then it is called information.

Description : The processed form of data is called information. Describe the further refinement of term information. -Technology

Last Answer : Information after being transformed into some conceptual framework, so that it can be manipulated and used cognitively, is called knowledge.

Description : The term is used to represent_“information is accurate and complete” (a) Security (b) Integrity (c) Completeness (d) Counterfeiting -Technology

Last Answer : (b) Integrity means information is accurate and complete.

Description : State one advantage of video conferencing over personal face_to face business meetings. -Technology

Last Answer : Video conferencing allows you to interact with many people face-to-face without being at the same place.

Description : Which type of software is designed to perform specific, personal, business or scientific processing tasks? (a) System (b) Application -Technology

Last Answer : (b) Application software is a computer software which is designed to help the user to perform some specific or personal tasks.

Description : devices at home which included a smartphone, a laptop and a personal computer. What type of network he would be setting up for the same? 1. PAN -Technology

Last Answer : Manoj would be setting up a PAN (Personal Area Network) which is best suited for setups involving a computer, a cell phone and/or a handheld computing device such as a PDA.

Description : A Privacy Impact Assessment (PIA) is an analysis of how information is handled?

Last Answer : All of the above

Description : OnStar technology has violated the privacy of some people by?

Last Answer : keeping records of their whereabouts.

Description : Explain the term: 1. Bandwidth 2. Broadband -Technology

Last Answer : 1. Bandwidth It is the Communication capacity of a network. It refers to the data carrying capacity of a channel or medium.2.Broadband Broadband is a wide bandwidth data transmission with an ability to simultaneously transport multiple signals and traffic types

Description : Explain the term Digital Divide. -Technology

Last Answer : It is an economic and social inequality with regard to access to, use of, or impact of Information and Communication Technologies (ICT).

Description : Explain the difference between data and information alongwith the examples of each. -Technology

Last Answer : Differences between data and information are as follows:DataInformation1.Data is used as input for the computer science.1.Information is the output of data.2.It is unprocessed facts or figures.2.It is ... of the class or the student is the information that can be concluded from the given data.

Description : Where can I find the best deals on personal loans online?

Last Answer : BlockFi offers low-cost USD loans backed by crypto. Access crypto capital without selling. Go to the Link below and please remove the spaces. htt ps://ya zing.c om/d eals/blockfi/rockthuto

Description : Which bank offers the best deals on personal loans in Tampa, FL?

Last Answer : Chase Bank and USAA are two large bank that have branches in the Tampa area. They both offer competitive rates on personal loans.

Description : Article 21 of the Fundamental Rights deals with which subject— (A) Protection of certain rights regarding freedom of speech, (B) Protection in respect of conviction of offence (C) Protection against arrest and detention in certain cases (D) Protection of life and personal liberty

Last Answer : (D) Protection of life and personal liberty

Description : Article 21 of the Fundamental Rights deals with which subject— (A) Protection of certain rights regarding freedom of speech, (B) Protection in respect of conviction of offence (C) Protection against arrest and detention in certain cases (D) Protection of life and personal liberty

Last Answer : (D) Protection of life and personal liberty

Description : The term 'PC-XT' refers to 1) Personal Computer External Technology 2) Personal Computer Extended Technology 3) Personal Computer Embedded Technology 4) Personal Computer Expanded Technology

Last Answer : 2) Personal Computer Extended Technology

Description : The term 'PC-XT' refers to 1 Personal Computer External Technology 2 Personal Computer Extended Technology 3 Personal Computer Embedded Technology 4 Personal Computer Expanded Technology

Last Answer : 2 Personal Computer Extended Technology

Description : The term 'PC - XT' refers to ____. (1) Personal Computer External Technology (2) Personal Computer Extended Technology (3) Personal Computer Expanded Technology (4) Personal Computer Embedded Technology

Last Answer : Personal Computer Extended Technology

Description : Define the term DBMS. -Technology

Last Answer : The full form of DBMS is a Database Management System. It is a computer based record keeping system.

Description : Name the term defined by given below statement: “A group of computers connected to each other by a link.” -Technology

Last Answer : Computer network is defined as a group of computers connected to each other by a link.

Description : Define the term Wi_Fi hotspot. -Technology

Last Answer : A hotspot is a site that offers Internet access over a WLAN via a router connected to a link from an Internet Service Provider (ISP).

Description : Identify the odd term amongst the following. (a) Microwave (b) Radiowave (c) Bluetooth -Technology

Last Answer : (d) Except optical fibre, all are wireless transmission media.

Description : HTML is a markup language. Expand the term HTML. -Technology

Last Answer : HyperText Markup Language.

Description : Animated movies, animated games etc, are some common applications of animation. What do you understand by the term animation? -Technology

Last Answer : Animation is a sequential series of still images that create an illusion of motion.

Description : Define the term Mail Merge. -Technology

Last Answer : Mail Merge is a useful tool that allows you to produce multiple letters, labels, envelopes by linking a main (common) document to a set of data or data source. The main document is linked to the ... be the letter informing the person that they have won money, or their car service time has arrived.

Description : ………… is the general term to refer to infectious software such as virus, worm, spyware etc. -Technology

Last Answer : Malware is the general term to refer to infectious software such as a virus, worm, spyware etc.

Description : Define the term workbook. -Technology

Last Answer : A workbook is a collection of worksheets. By default, there are three worksheets in every workbook.