首页
登录
职称英语
[originaltext] With the development of the computer, the possibility of stor
[originaltext] With the development of the computer, the possibility of stor
游客
2024-02-01
67
管理
问题
With the development of the computer, the possibility of storing more and more information at a central point is growing rapidly. But so is the possibility of gaining access to the stored information. And that raises serious questions regarding personal privacy. Four basic principles of privacy have emerged from various studies, and appear to be the foundation for sound public policy.
We at IBM believe:
1. Individuals should have access to information about themselves in record-keeping systems. And there should be some procedure for individuals to find out how this information is used.
2. There should be a way for individuals to correct or amend inaccurate records.
3. Information on individuals should not be improperly disclosed or used for other than authorized purposes. The custodian of data files containing sensitive information should take all reasonable precautions to make sure that the data is reliable and not misused.
Translating such broad principles into specific and uniform guidelines is not easy. In particular, there must be a proper balance between limiting access to information for the protection of individual privacy on the one hand, and allowing freedom of information to fulfill the needs of society on the other.
Questions 19 to 21 are based on the passage you have just heard.
19. What raises the problems regarding personal privacy?
20. What is suggested by people at IBM?
21. What is the difficulty to make uniform guidelines?
选项
A、Information on individuals should not be used without authorized purposes.
B、The stored information should be kept from individuals’ access.
C、Individuals have no right to correct or amend records.
D、Individuals need no procedures to find out how his information is used.
答案
A
解析
信息明示题。由第1条可知选项B、D错误。由第2条可知选项C错误。由第3条可知选项A“未经授权许可,不能使用个人信息”正确。故选A。
转载请注明原文地址:https://tihaiku.com/zcyy/3411520.html
相关试题推荐
[originaltext]M:Excuseme,Dr.Smith,Istillcan’tfindanymaterialforthe
[originaltext]M:Excuseme,Dr.Smith,Istillcan’tfindanymaterialforthe
[originaltext]M:Excuseme,Dr.Smith,Istillcan’tfindanymaterialforthe
[originaltext]M:Excuseme,Dr.Smith,Istillcan’tfindanymaterialforthe
[originaltext]W:IfProf.Thomsonwaswillingtogiveusathree-dayextension
[originaltext]W:IfProf.Thomsonwaswillingtogiveusathree-dayextension
[originaltext]W:IfProf.Thomsonwaswillingtogiveusathree-dayextension
[originaltext]W:IfProf.Thomsonwaswillingtogiveusathree-dayextension
[originaltext]W:IfProf.Thomsonwaswillingtogiveusathree-dayextension
[originaltext]M:Thetaxiiswaitingforus.Let’shurry.W:Waitaminute.I’l
随机试题
A.decreasingB.underlinesC.deliveredD.missions
数据安全技术包括:()A.用户身份验证 B.口令保护技术 C.存取访问控制
以下属于穿经梨状肌下孔的结构除外A、坐骨神经 B、股后皮神经 C、臀下神经
衍生产品类证券产品的基本特征包括()。 Ⅰ.跨期性 Ⅱ.杠杆性 Ⅲ.可复
骨髓增生程度极度活跃,原始细胞占32%(NEC),这些原始细胞的化学染色结果分别
从所给的四个选项中,选择最合适的一个填入问号处,使之呈现一定规律性: A.如上
资产按其流动性(即变现速度或能力)不同,可以分为()。A.现金 B.流动资产
当房地产市场成熟且处于正常状况时,比较价值、收益价值、成本价值和开发价值应基本一
臀横纹至胭横纹的骨度分寸是A.19寸 B.12寸 C.14寸 D.16寸
深Ⅱ度烧伤,若无感染等并发症,通常愈合时间为 A.2~3日B.1周C.2周
最新回复
(
0
)