Filters
Question type

Study Flashcards

Justin's posts on Facebook provide information that establishes his intent and what he knew at a particular time,indicating potential liability. For this and other reasons,social media posts are often


A) included in discovery in litigation.
B) used by law enforcement to detect and prosecute criminals.
C) used by federal regulators in investigations into illegal activities.
D) all of the choices.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Dana downloads music into her computer's random access memory,or RAM,without authorization. This is


A) copyright infringement.
B) within Dana's rights as a computer user.
C) a basis of liability for the computer maker if it does not act against Dana.
D) none of the choices.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

It is frequently the companies rather than courts or legislatures that are defining the privacy rights of their online users.

A) True
B) False

Correct Answer

verifed

verified

Employees of Bodegas & Bistros Inc. (2B) maintain a password-protected social media page to "vent about work." When 2B learns of the page,the company intimidates the network that operates the page into revealing the password,and after reviewing the posts,fires the participants. Most likely,this is


A) a violation of the Stored Communications Act.
B) within 2B's rights as an employer.
C) a subject for dispute resolution by the communications providers that the employees' page uses.
D) a "business-extension exception" under the Electronic Communications Privacy Act.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

File-sharing software can be used to download others' copyrighted property without liability for any infringement.

A) True
B) False

Correct Answer

verifed

verified

Far & Wide Corporation uses the trademark of Google Inc. in a meta tag without Google's permission. This is


A) cybersquatting.
B) typosquatting.
C) trademark infringement.
D) trademark dilution.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Sales & Revenue,Inc.,discovers that defamatory statements about its policies and products are being posted in an online forum. TransWeb Inc.,the Internet service provider whose users are posting the messages,refuses to disclose the identity of the person or persons responsible. Sales & Revenuefiles a suit against the anonymous users. The plaintiff can obtain from TransWeb the identity of the persons responsible for the defamatory messages by


A) using the authority of the court.
B) gaining unauthorized access to TransWeb's servers.
C) deceiving TransWeb into revealing the posters' identities.
D) no legal or illegal means.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

To protect domain name rights from would-be cybersquatters and typosquatters,AgriBusiness Inc. and other large corporations may have to


A) register thousands of domain names across the globe.
B) pay the owners of Web sites with identical or confusingly similar domain names for the number of unique visits,or hits,to the sites.
C) change their domain names to avoid identical or confusingly similar domain names.
D) change their trademarks to avoid identical or confusingly similar domain names.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

In an attempt to combat spam,thirty-seven states have enacted laws that prohibit or regulate its use.

A) True
B) False

Correct Answer

verifed

verified

Employees,clients,and others with authorization use World Transport Corporation's network around the globe to share computer files. This is


A) an invasion of privacy.
B) trademark and copyright infringement.
C) digital sampling.
D) a distributed network.

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Because of the loss of significant amounts of revenue as a result of unauthorized digital downloads,file-sharing has created problems for


A) the motion picture industry.
B) recording artists and their labels.
C) the companies that distribute file-sharing software.
D) all of the choices.

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Federal law permits the intentional interception of any wire,oral,or electronic communication.

A) True
B) False

Correct Answer

verifed

verified

The manufacture,import,sale,and distribution of devices or services for the circumvention of encryption software is prohibited.

A) True
B) False

Correct Answer

verifed

verified

ConnectWeb,Inc.,operates a subscription-based service that extends the software and storage capabilities of its subscribers. This is


A) dilution.
B) peer-to-peer (P2P) networking.
C) cloud computing.
D) a distributed network.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Online defamation is wrongfully hurting a person's reputation by communicating false statements about that person to others online.

A) True
B) False

Correct Answer

verifed

verified

Employees' posts on social media may be protected under labor law.

A) True
B) False

Correct Answer

verifed

verified

Stig includes in his song "Sneaky" a few seconds of Wily's copyrighted sound recording "Wits" without permission. Some federal courts have found that such digital sampling is


A) a violation of copyright law.
B) a "fair use" exception to the provisions of the act.
C) not a "fair use" exception to the provisions of the act.
D) all of the choices.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Sound Financials Corporation sends daily e-mail ads to its previous customers and those who have opted to receive the notices.Instable Investments,Inc.,sends e-mail ads to any e-mail address that Instable can find on the Web or otherwise generate. -Refer to Fact Pattern 7-1. In those states with antispam laws,federal law


A) prohibits or regulates the use of spam.
B) requires the use of spam by business entities.
C) bans the use of spam altogether.
D) preempts the application of state law to commercial e-mail with certain exceptions.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Riley obtains permission from Saga Company to use the firm's game app on Riley's smartphone,tablet,and other mobile device. But Riley does not obtain ownership rights in the app. This is


A) a license.
B) a cookie.
C) cloud computing.
D) a violation of the law.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

The employees of The Car Company share company-related resources among multiple computers without requiring a central network server. This is


A) digital sampling.
B) cybersquatting.
C) cloud computing.
D) peer-to-peer (P2P) networking.

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 72

Related Exams

Show Answer