Question
Question 1 (2.5 points)
__________ are tools that filter offensive content.
Question 1 options:
Spam blockers
Technology protection measures (TPM)
Network databases
Proxy servers
Save
Question 2 (2.5 points)
To be COPPA-compliant, a privacy policy must provide “assurance that participation is not conditioned on data collection.” Which of the following statements offer the best explanation of this criterion?
Question 2 options:
A Web site can’t require children to submit contact details in order to be allowed to use the site. Web sites are not allowed to collect more information than necessary for a child to participate in an activity.
The Web site must state whether collected information is shared with a third party.
Web sites must state how the information will be used. It must be specific.
This includes the name, mailing address, telephone number, and e-mail address of all operators collecting or using the information collected on the Web site.
Save
Question 3 (2.5 points)
Some people believe that COPPA requirements violate freedom of speech without censorship guaranteed by the __________ Amendment.
Question 3 options:
First
Second
Fourth
Seventh
Save
Question 4 (2.5 points)
The __________ protects the personal information of children online.
Question 4 options:
Family Educational Rights and Privacy Act (FERPA)
Health Insurance Portability and Accountability Act (HIPAA)
Children’s Internet Protection Act (CIPA)
Children’s Online Privacy Protection Act (COPPA)
Save
Question 5 (2.5 points)
Collection and use of a child’s personal information such as name, e-mail address, or social security number by a Web site operator is governed by:
Question 5 options:
FERPA
HIPAA
CIPA
COPPA
Save
Question 6 (2.5 points)
Which of the follow is not one of the rights that parents are guaranteed under COPPA?
Question 6 options:
Parents also can request that a Web site operator delete data held on their children.
The Web site must re-notify parents whenever it changes its data collection and use procedures.
Parents must be allowed to review information collected from their children.
Parents will be notified by a Web site if it is collecting an e-mail address to respond to a one-time request from a child.
Save
Question 7 (2.5 points)
In which of the following circumstances would a library need to disable a TPM?
Question 7 options:
At the request of an adult to view content for research or other lawful purpose
At the request of a child with a document of written consent from his/her parent
At the request of anyone over the age of 17
At the request of any school official
Save
Question 8 (2.5 points)
Which of the following best defines a technology protection measure (TPM)?
Question 8 options:
It is any technology that can block or filter the objectionable content.
It is technology that provides monitoring protocols that track a child’s online activities.
It is technology that offers age-verification protocols that restrict online access to adults.
It is technology that accepts Internet requests from clients, retrieves the pages, and serves them to the client.
Save
Question 9 (2.5 points)
__________ was created by Congress to make health insurance portable.
Question 9 options:
CIPA
HIPAA
HITECH Act
FERPA
Save
Question 10 (2.5 points)
Regarding pre-existing conditions, HIPAA:
Question 10 options:
only allows employer-provided health plans to look back six months for pre-existing conditions.
neither A nor B
in most instances limits the amount of time health plans can require an individual to “sit out” of coverage to no more than 12 months.
both A and B
Save
Question 11 (2.5 points)
The U.S. Securities and Exchange Commission reviews a public company’s Form 10-K at least once every __________ years.
Question 11 options:
four
two
three
five
Save
Question 12 (2.5 points)
The main goal of the __________ is to protect shareholders and investors from financial fraud.
Question 12 options:
Sarbanes-Oxley Act (SOX)
Gramm-Leach-Bliley Act
Securities and Exchange Commission
Public Company Accounting Oversight Board
Save
Question 13 (2.5 points)
Which of the following parties is not among those who would share an individual’s health information?
Question 13 options:
Government agencies like Medicaid or Medicare
Insurance companies
Treatment providers
Potential employers
Save
Question 14 (2.5 points)
All of the following are types of information included on a Form 10-K except:
Question 14 options:
financial statements.
explanation of how the company is organized and operates.
auditor’s report.
lists of employees and subcontractors.
Save
Question 15 (2.5 points)
The HIPAA __________ dictates how covered entities must protect the privacy of personal health information.
Question 15 options:
Privacy Rule
Red Flag Rule
Information Security Rule
Health Information Protection Rule
Save
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more