Deck 14: Ethical Risks and Responsibilities of IT Innovations
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
Play
Full screen (f)
Deck 14: Ethical Risks and Responsibilities of IT Innovations
1
Examples of civil rights are each of the following except ________.
A)freedom of the press
B)right to vote
C)right to any speech
D)right to equality in public places
A)freedom of the press
B)right to vote
C)right to any speech
D)right to equality in public places
C
2
Google's engineers realized the cars could be used for ________ by sniffing out and mapping the physical location of the world's Wi-Fi routers.
A)wardriving
B)mobile hacking
C)snooping
D)drive-by recording
A)wardriving
B)mobile hacking
C)snooping
D)drive-by recording
A
3
Which of the following best describes the views and arguments about the consequences of wearing Google Glass?
A)Google Glass is a benefit to society because it improves personal security and safety.
B)Technology is inherently neutral.
C)Google Glass is a danger to society and Google has a responsibility to address this issue.
D)There are diverse views and arguments about the consequences of wearing Google Glass.
A)Google Glass is a benefit to society because it improves personal security and safety.
B)Technology is inherently neutral.
C)Google Glass is a danger to society and Google has a responsibility to address this issue.
D)There are diverse views and arguments about the consequences of wearing Google Glass.
D
4
Private content that uninhibited teenagers with bad judgment had posted online ________.
A)will be archived and inaccessible after 12 months
B)is not retained
C)cannot be made to disappear
D)can only be purged by the individual,according to the site's removal procedures
A)will be archived and inaccessible after 12 months
B)is not retained
C)cannot be made to disappear
D)can only be purged by the individual,according to the site's removal procedures
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Social recruitment refers to use of social media to find,screen,and select job candidates.Often it involves searching information ________.
A)the job candidate did not want considered
B)that is illegal to use in the hiring process
C)that violates the EEOC or SEC
D)A and B
A)the job candidate did not want considered
B)that is illegal to use in the hiring process
C)that violates the EEOC or SEC
D)A and B
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
3D-bioprinted human organs may be subject to ________.
A)conflicting healthcare regulations
B)conflicting religious,political,moral,and financial interests
C)skills of bio-engineers
D)technology limitations
A)conflicting healthcare regulations
B)conflicting religious,political,moral,and financial interests
C)skills of bio-engineers
D)technology limitations
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
Which is not a step that companies can take to balance the competing risks of negligent hiring and social discrimination?
A)Hire investigation companies to do thorough searches of candidates' backgrounds.
B)Let candidates themselves disclose information found on social media.
C)A consistent and well-documented process is needed to ensure and show compliance if there is an EEO employment investigation.
D)Make sure recruiters do not pressure applicants to disclose protected information via social media by requiring them to disclose passwords or relax privacy settings for purposes of review by the employer.
A)Hire investigation companies to do thorough searches of candidates' backgrounds.
B)Let candidates themselves disclose information found on social media.
C)A consistent and well-documented process is needed to ensure and show compliance if there is an EEO employment investigation.
D)Make sure recruiters do not pressure applicants to disclose protected information via social media by requiring them to disclose passwords or relax privacy settings for purposes of review by the employer.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
________ are characteristics that have been identified by law that cannot be used in the hiring process.
A)Civil rights
B)Protected classes
C)EEOC practices
D)Negligent hiring
A)Civil rights
B)Protected classes
C)EEOC practices
D)Negligent hiring
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
Types of risky behaviors of free and paid mobile apps include all of the following except ________.
A)Location tracking
B)Accessing the device's address book or contact list
C)Decrypting messages
D)Sharing data with ad networks and analytics companies
A)Location tracking
B)Accessing the device's address book or contact list
C)Decrypting messages
D)Sharing data with ad networks and analytics companies
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
According to the United Nations Guiding Principles on business and human rights,if Glass distracts drivers and causes traffic accidents,then __________.
A)Google has a responsibility to address this issue and to inform users that there may be social risks from using their products in plain language.
B)Glass users have the social responsibility to not use the device while driving similar to rules about smartphone use while driving.
C)Lawmakers will have greater authority to determine where the driver or tech companies are responsible for social harms.
D)All are true.
A)Google has a responsibility to address this issue and to inform users that there may be social risks from using their products in plain language.
B)Glass users have the social responsibility to not use the device while driving similar to rules about smartphone use while driving.
C)Lawmakers will have greater authority to determine where the driver or tech companies are responsible for social harms.
D)All are true.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
________ occurs when the civil rights of an individual are denied or interfered with because of their membership in a particular group or class
A)Harassment
B)Prejudice
C)Negligent hiring
D)Discrimination
A)Harassment
B)Prejudice
C)Negligent hiring
D)Discrimination
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
To the extent that employers conduct a social media background check on job candidates,best practices are all of the following except _________.
A)Use only publicly available information.
B)Have either a third party or a designated person within the company who does not make hiring decisions do the background check.
C)Limit access to private information by friending someone.
D)Do not request username or passwords for social media accounts.
A)Use only publicly available information.
B)Have either a third party or a designated person within the company who does not make hiring decisions do the background check.
C)Limit access to private information by friending someone.
D)Do not request username or passwords for social media accounts.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
Which is not a protected class?
A)Age
B)Education
C)Genetic information
D)Religion
A)Age
B)Education
C)Genetic information
D)Religion
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
What is a potential disadvantage of social recruiting methods?
A)Increases cost of in-house recruiting
B)Increases candidates' control of their privacy
C)Increases risk of discrimination
D)Increases risk of hiring the wrong person for the job
A)Increases cost of in-house recruiting
B)Increases candidates' control of their privacy
C)Increases risk of discrimination
D)Increases risk of hiring the wrong person for the job
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
A conclusion based on the 2013 Pew study about online privacy concerns was that ________.
A)30% of Internet users were worried about the information available about them online
B)50% of Internet users were not worried about their online privacy
C)The percentage of Internet users worried about their online privacy had decreased over 4 years.
D)Most Facebook users trusted the site's privacy policies
A)30% of Internet users were worried about the information available about them online
B)50% of Internet users were not worried about their online privacy
C)The percentage of Internet users worried about their online privacy had decreased over 4 years.
D)Most Facebook users trusted the site's privacy policies
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
If a workplace violence incident occurred and the attacker's public social networking profile contained information that could have predicted that behavior,the employer may be held liable for ________.
A)Obstruction
B)Civil rights violations
C)Negligent hiring
D)Discrimination
A)Obstruction
B)Civil rights violations
C)Negligent hiring
D)Discrimination
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
Which statement about privacy in the U.S.is incorrect?
A)A person's privacy is well-protected by laws and regulations,and is based to a minor extent on choices the person has made.
B)Privacy is the right to self-determine what information about you is made accessible,to whom,when,and for what use or purpose.
C)Privacy means we have freedom of choice and control over our personal information,including what we do not want shared with or used by others.
D)Unauthorized disclosure of personal information is normally considered a breach of privacy,although what is unauthorized and what is personal information are matters of dispute,particularly when it is online
A)A person's privacy is well-protected by laws and regulations,and is based to a minor extent on choices the person has made.
B)Privacy is the right to self-determine what information about you is made accessible,to whom,when,and for what use or purpose.
C)Privacy means we have freedom of choice and control over our personal information,including what we do not want shared with or used by others.
D)Unauthorized disclosure of personal information is normally considered a breach of privacy,although what is unauthorized and what is personal information are matters of dispute,particularly when it is online
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
The ________ scrutinizes business practices to regulate "unfair and deceptive trade practices."
A)EEOC
B)FFIEC
C)FTC
D)FCC
A)EEOC
B)FFIEC
C)FTC
D)FCC
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
The term ________ refers to the phenomenon where social users are concerned about privacy,but their behaviors contradict these concerns to an extreme degree.
A)Facebook fallacy
B)Social denial
C)Privacy paradox
D)Media comfort
A)Facebook fallacy
B)Social denial
C)Privacy paradox
D)Media comfort
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
________ is a claim made by an injured party against an employer who knew or should have known about an employee's background that indicates a dangerous or untrustworthy character.
A)Civil rights
B)Protected class
C)Genome
D)Negligent hiring
A)Civil rights
B)Protected class
C)Genome
D)Negligent hiring
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
Despite the challenges and lack of clear answers,ethics is important because it has become clear that relying on __________ alone to safeguard the community is insufficient.
A)Corporate policy
B)The law
C)Audit trails
D)Moral behavior
A)Corporate policy
B)The law
C)Audit trails
D)Moral behavior
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
Architecting resilience depends on _________,which means that a failure in one component cannot bring down the entire edifice.
A)Isolation
B)Integration
C)Redundancy
D)Flexibility
A)Isolation
B)Integration
C)Redundancy
D)Flexibility
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
According to Accenture's Technology Vision 2014,becoming a(n)_______ is crucial to how enterprises innovate and differentiate from competitors.
A)truly digital business
B)multimedia organization
C)mobile commerce leader
D)electronic-centric firm
A)truly digital business
B)multimedia organization
C)mobile commerce leader
D)electronic-centric firm
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
The convergence of several technologies is blurring the digital and physical worlds.These converging technologies include each of the following except ________.
A)greater bandwidth
B)explosion of connected M2M devices and IoT
C)expanding software-defined networking
D)increased use of real-time analytics
A)greater bandwidth
B)explosion of connected M2M devices and IoT
C)expanding software-defined networking
D)increased use of real-time analytics
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
________ refers to situations when too much data interferes with our ability to focus and be productive.
A)Electronic static
B)Social stimuli
C)Cognitive overload
D)Antidistraction
A)Electronic static
B)Social stimuli
C)Cognitive overload
D)Antidistraction
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
The FCC determined that Google's Street View actions and snooping on unencrypted wireless data were:
A)An unfair advantage
B)Environmentally harmful
C)Spying and intolerable invasions of privacy
D)Not technically illegal
A)An unfair advantage
B)Environmentally harmful
C)Spying and intolerable invasions of privacy
D)Not technically illegal
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
Because of legacy systems and data silos that limit the value that organizations get out of their data,enterprise data are often underutilized.Accenture recommends that companies start treating data like a(n)________.
A)Account receivable
B)digital credit
C)Supply chain
D)ecosystem
A)Account receivable
B)digital credit
C)Supply chain
D)ecosystem
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
_________ can give every business access to an agile workforce that is not only better suited to solving some of the problems that organizations struggle with today but in many cases will do it for free.
A)Crowdsourcing
B)LinkedIn
C)Social recruiting
D)Brainstorming
A)Crowdsourcing
B)LinkedIn
C)Social recruiting
D)Brainstorming
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
In Google's view and business model,the whole purpose of Glass is to wear it responsibly.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
We do not live in a world without consequences and boundaries.Yet many people act as though they do,as the privacy paradox points out.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
The legal system is reactive and slower moving that IT-and may not be prepared for upcoming challenges.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
3D printers can use ________ electricity to produce a part than would have been used to produce the same part by nonadditive manufacturing.
A)Half the
B)Double the
C)10 times more
D)100 times more
A)Half the
B)Double the
C)10 times more
D)100 times more
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
Architecting resilience depends on _________,which means that every component is backed up by an alternative in case it fails.
A)Isolation
B)Integration
C)Redundancy
D)Flexibility
A)Isolation
B)Integration
C)Redundancy
D)Flexibility
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
Private content that uninhibited teenagers with bad judgment posted or sent cannot be made to disappear when they apply for jobs requiring security clearance or intense background checks or run for public office.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
A person's privacy is based to a large extent on what choices that person has made.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
__________ or sniffing out and mapping the physical location of Wi-Fi routers is a hacking technique,an invasion of privacy,and an information security risk.
A)IP monitoring
B)Spear fishing
C)Wardriving
D)Snooping
A)IP monitoring
B)Spear fishing
C)Wardriving
D)Snooping
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
Privacy means we have freedom of choice and control over our personal information,including what we do not want shared with or used by others
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
Every industry is being impacted by ________ computing systems-the supersized,scalable,and resilient data centers pioneered by data-dependent and social media companies.
A)cloud
B)hyperscale
C)mobile networked
D)Hadoop
A)cloud
B)hyperscale
C)mobile networked
D)Hadoop
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
With enormous demands for processing power,________ matters more than ever in transforming enterprises into digital businesses.
A)hardware
B)mobile apps
C)social networks
D)software
A)hardware
B)mobile apps
C)social networks
D)software
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
Unauthorized disclosure of personal information is normally considered a breach of privacy,because the law clearly defines what is unauthorized and what is personal information.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
Canadian Tire enabled its credit card business to create psychological profiles of its cardholders that were built using alarmingly precise correlations.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
Both free and paid third-party mobile apps are regulated by the FTC to protect privacy.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
In addition to crowdfunding,companies are using LinkedIn to provide market insight and assess product viability for a lot less than what traditional means cost.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
Discrimination is biased or prejudicial treatment in recruitment,hiring,or employment based on protected classes characteristics.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
Companies expose themselves to harsh sanctions by federal agencies when they violate the privacy policies that their customers rely upon.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
Intelligent interfaces are emerging that allow decisions to be made on the edge-where digital and physical worlds meet,which could be on your wrist,in your hand,or in your field of vision.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
Bioprinting produces 3D biological objects or parts that are highly precise in shape and mechanical complexity.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
Several researchers estimate that distraction costs hundreds of billions of dollars a year in lost productivity.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
There are several frameworks provided by the FTC for deciding what is ethical and what is not.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
When a Google Street View car encountered an open Wi-Fi network-a non-password-protected router-it recorded all the digital traffic traveling across that router,which the FCC determined was illegal.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
According to Accenture's Technology Vision 2014,becoming a truly mobile business is crucial to how enterprises innovate and differentiate from competitors
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
The Facebook paradox refers to this phenomenon where social users are concerned about privacy but their behaviors contradict these concerns to an extreme degree.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
Negligent hiring is a claim made by an injured party against an employer who knew or should have known about an employee's background that indicates a dangerous or untrustworthy character.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
Predicting people's behavior is big business-and increasingly illegal because of privacy and antimony laundering laws.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
3D printers can significantly reduce impacts on the environment than those of standard manufacturing methods.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
Recruiters learn a great deal of information that they are allowed to use in their decision to interview,recommend,or hire someone from what job candidates post about themselves and through their check-ins and posts,.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
Discrimination is prejudicial treatment that tends to be easy to prove.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
Controlling the physical world with sensors and digital devices depends on bandwidth and the ability to analyze data in real time.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
Many people live and work in a state of continuous partial attention as they move through their day-loosely connected to friends and family through various apps on mobile and wearable devices.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
There are competing business interests and trade-offs at work when the issue is privacy.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
Crowdsourcing can give every business access to an agile workforce that is not only better suited to solving some of the problems that organizations struggle with today but in many cases will do it for free.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
Discuss two technologies that are converging and,as a result,are blurring the digital and physical worlds.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
The __________ refers to this phenomenon where social users are concerned about privacy but their behaviors contradict these concerns to an extreme degree.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
With enormous demands for processing power,hardware matters more than ever in transforming enterprises into digital businesses.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
Netflix built resiliency into its IT architecture by following two design principles: isolation and redundancy.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
An estimated 50% of companies integrate their data across the enterprise.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
Because of legacy systems and data silos that limit the value that organizations get out of their data,enterprise data are often underutilized.Accenture recommends that companies start treating data like a __________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
__________ is a term used in these laws to describe characteristics that cannot be targeted for discrimination and harassment.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
Despite benefits,the medical application of 3D printing to produce living tissue and organs,or 3D __________,is expected to spark major ethical debates
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
High-performance companies are increasingly recognizing that hyperscale systems are a vital part of becoming a digital business.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
How many more things do you check today compared to a year ago? How long can you go without checking your devices without experiencing anxiety? When do you put down your mobiles and concentrate on one thing at a time? Do your answers indicate that you are experiencing digital or connectivity overload?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
Explain the principle of privacy.Describe the privacy paradox.Do you agree that a person's privacy is based to a large extent on what choices that person has made? Explain why or why not.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
__________ is the right to self-determine what information about you is made accessible,to whom,when,and for what use or purpose.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
__________ can give every business access to an agile workforce that is not only better suited to solving some of the problems that organizations struggle with today but in many cases will do it for free.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
________ means that every component in the IT architecture is backed up by an alternative in case it fails.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
Google's engineers realized the cars could be used for ________ which is also a hacking technique,an invasion of privacy,and an information security risk.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
Discuss the competing interests and tradeoffs at work when the issue is privacy.In your opinion,why are ethics important when there are numerous civil rights and privacy laws?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
________ means that a failure in one component of a system or IT architecture cannot bring down the entire enterprise.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
__________ is a claim made by an injured party against an employer who knew or should have known about an employee's background that indicates a dangerous or untrustworthy character.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
Every industry is being impacted by __________computing systems-the supersized,scalable,and resilient data centers pioneered by data-dependent and social media companies
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck