A) included in discovery in litigation.
B) used by law enforcement to detect and prosecute criminals.
C) used by federal regulators in investigations into illegal activities.
D) all of the choices.
Correct Answer
verified
Multiple Choice
A) copyright infringement.
B) within Dana's rights as a computer user.
C) a basis of liability for the computer maker if it does not act against Dana.
D) none of the choices.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a violation of the Stored Communications Act.
B) within 2B's rights as an employer.
C) a subject for dispute resolution by the communications providers that the employees' page uses.
D) a "business-extension exception" under the Electronic Communications Privacy Act.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) cybersquatting.
B) typosquatting.
C) trademark infringement.
D) trademark dilution.
Correct Answer
verified
Multiple Choice
A) using the authority of the court.
B) gaining unauthorized access to TransWeb's servers.
C) deceiving TransWeb into revealing the posters' identities.
D) no legal or illegal means.
Correct Answer
verified
Multiple Choice
A) register thousands of domain names across the globe.
B) pay the owners of Web sites with identical or confusingly similar domain names for the number of unique visits,or hits,to the sites.
C) change their domain names to avoid identical or confusingly similar domain names.
D) change their trademarks to avoid identical or confusingly similar domain names.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) an invasion of privacy.
B) trademark and copyright infringement.
C) digital sampling.
D) a distributed network.
Correct Answer
verified
Multiple Choice
A) the motion picture industry.
B) recording artists and their labels.
C) the companies that distribute file-sharing software.
D) all of the choices.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) dilution.
B) peer-to-peer (P2P) networking.
C) cloud computing.
D) a distributed network.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a violation of copyright law.
B) a "fair use" exception to the provisions of the act.
C) not a "fair use" exception to the provisions of the act.
D) all of the choices.
Correct Answer
verified
Multiple Choice
A) prohibits or regulates the use of spam.
B) requires the use of spam by business entities.
C) bans the use of spam altogether.
D) preempts the application of state law to commercial e-mail with certain exceptions.
Correct Answer
verified
Multiple Choice
A) a license.
B) a cookie.
C) cloud computing.
D) a violation of the law.
Correct Answer
verified
Multiple Choice
A) digital sampling.
B) cybersquatting.
C) cloud computing.
D) peer-to-peer (P2P) networking.
Correct Answer
verified
Showing 21 - 40 of 72
Related Exams