Filters
Question type

Study Flashcards

When you download an application on your smartphone,you are typically entering into a license agreement.

A) True
B) False

Correct Answer

verifed

verified

Online defamation is wrongfully hurting a person's reputation by communicating false statements about that person to others online.

A) True
B) False

Correct Answer

verifed

verified

Cybersquatting occurs when key words are inserted into a Web site's keywords coding to tell Internet browsers specific information about a Web page.

A) True
B) False

Correct Answer

verifed

verified

ConnectWeb,Inc. ,operates a subscription-based service that extends the software and storage capabilities of its subscribers.This is


A) dilution.
B) peer-to-peer (P2P) networking.
C) cloud computing.
D) a distributed network.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Downloading music into a computer's random access memory,or RAM,is not copyright infringement,even if it is done without authorization.

A) True
B) False

Correct Answer

verifed

verified

In some states,an unsolicited e-mail must include a toll-free phone number that the recipient can use to ask the sender to send no more unsolicited e-mail.

A) True
B) False

Correct Answer

verifed

verified

Using another's trademark in a meta tag does not normally constitute trademark infringement,even if it is done without the owner's permission.

A) True
B) False

Correct Answer

verifed

verified

About half of the states have enacted legislation to protect individuals from having to disclose their social media passwords.

A) True
B) False

Correct Answer

verifed

verified

In an attempt to combat spam,thirty-seven states have enacted laws that prohibit or regulate its use.

A) True
B) False

Correct Answer

verifed

verified

Sonya and other employees of TransGlobal Inc.maintain a password-protected social media page on which they post comments on work-related issues.The posts range from positive to negative,supporting the page's purpose to "vent about work." When TransGlobal learns of the page,the company intimidates Sonya into revealing the password,and after reviewing the posts,fires her and the other participants.Which federal law discussed in this chapter most likely applies to this situation? Has this law been violated? Discuss.

Correct Answer

verifed

verified

The federal law discussed in this chapte...

View Answer

Jason transfers select copyrighted music recordings,without the copyright owners' authorization,through his computer and phone to his friends.Jason does not charge his friends for his "service." This is


A) copyright infringement.
B) a license.
C) goodwill.
D) "fair use."

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Fact Pattern 9-1​ Sound Financials Corporation sends daily e-mail ads to its previous customers and those who have opted to receive the notices.Instable Investments,Inc. ,sends e-mail ads to any e-mail address that Instable can find on the Web or otherwise generate. -Refer to Fact Pattern 9-1.One of the advertisers-either Sound Financials or Instable Investments-is acting within the bounds of federal law.Federal law permits the sending of


A) unsolicited commercial e-mail.
B) solicited commercial e-mail only.
C) commercial e-mail to randomly generated addresses.
D) commercial e-mail to addresses "harvested" from Web sites through the use of specialized software.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Web Marketing Inc.buys and sells domain names with the click of a mouse.A domain name can be bought and sold many times.Each change of owner is registered automatically as part of a mass registration.In this environment


A) cybersquatting can flourish.
B) typosquatting occurs unintentionally through clerical misspellings.
C) brands and trademarks are automatically protected from cybersquatters.
D) the Federal Trade Commission can sanction Web Marketing.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Federal law permits the sending of unsolicited commercial e-mail and does not prohibit spamming activities.

A) True
B) False

Correct Answer

verifed

verified

An internal company network can better protect the company's trade secrets.

A) True
B) False

Correct Answer

verifed

verified

Employees,clients,and others with authorization use World Transport Corporation's network around the globe to share computer files.This is


A) an invasion of privacy.
B) trademark and copyright infringement.
C) digital sampling.
D) a distributed network.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Fact Pattern 9-2​ CallTalk Corporation,a smartphone and phone-time seller,chooses to use and register "calltalk" as its domain name.Later,CallTalk's less successful competitor,CellTalk Company,chooses to use and register "caltalk" (an intentional misspelling of "calltalk") as its domain name.Still later,Call&Talk,Inc. ,uses the domain name "callltalk" (also a deliberate misspelling of "calltalk") without CallTalk's authorization,to sell pornographic phone conversations. -Refer to Fact Pattern 9-2.Call&Talk's use of the domain name "callltalk," without CallTalk's authorization,to sell pornographic phone conversations,is


A) a legitimate marketing technique.
B) a fair use.
C) a license.
D) trademark dilution.

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

"Bad faith intent" is too subjective to be an element of a cause of action under the Anticybersquatting Consumer Protection Act.

A) True
B) False

Correct Answer

verifed

verified

An Internet service provider is liable for any act of copyright infringement by its customer.

A) True
B) False

Correct Answer

verifed

verified

Employees of Bodegas & Bistros Inc.(B&B) maintain a password-protected social media page to "vent about work." When B&B learns of the page,the company intimidates the network that operates it into revealing the password.After reviewing the posts,B&B fires the participants.Most likely,this is


A) a violation of the Stored Communications Act.
B) within B&B's rights as an employer.
C) a subject for dispute resolution by B&B's Internet service.
D) a "business-extension exception" under the Electronic Communications Privacy Act.

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Showing 41 - 60 of 72

Related Exams

Show Answer