Filters
Question type

Study Flashcards

Employees' posts on social media may be protected under labor law.

A) True
B) False

Correct Answer

verifed

verified

The law restricts the "fair use" of methods for bypassing encryption software for noncommercial purposes.

A) True
B) False

Correct Answer

verifed

verified

The employees of Eco Engineering Inc. share company-related resources among multiple computers without requiring a central network server. This is


A) ​digital sampling.
B) ​cybersquatting.
C) ​cloud computing.
D) ​peer-to-peer (P2P) networking.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Federal law prevents a provider of communication services-such as a cell phone company-from divulging private communications to certain entities and individuals.

A) True
B) False

Correct Answer

verifed

verified

Online defamation is wrongfully hurting a person's reputation by communicating false statements about that person to others online.

A) True
B) False

Correct Answer

verifed

verified

Mobile Device Company (MDC) discovers that defamatory statements about its policies and products are being posted in an online forum. NuView Inc., the Internet service provider whose users are posting the messages, refuses to disclose the identity of the person or persons responsible. MDC should


A) ​seek to use the authority of the court to obtain the identity from NuView.
B) ​bring a suit against NuView for publishing the statements.
C) ​counter the statements with its own posts.
D) ​post defamatory statements about NuView.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Sonya and other employees of TransGlobal Inc. maintain a password-protected social media page on which they post comments on work-related issues. The posts range from positive to negative, supporting the page's purpose to "vent about work." When TransGlobal learns of the page, the company intimidates Sonya into revealing the password, and after reviewing the posts, fires her and the other participants. Which federal law discussed in thisChapter most likely applies to this situation? Has this law been violated? Discuss.

Correct Answer

verifed

verified

The federal law discussed in this chapte...

View Answer

Fact Pattern 14-1 Sound Financials Corporation sends daily e-mail ads to its previous customers and those who have opted to receive the notices. Instable Investments, Inc., sends e-mail ads to any e-mail address that Instable can find on the Web or otherwise generate. -Refer to Fact Pattern 14-1. One of the advertisers-either Sound Financials or Instable Investments-is acting within the bounds of federal law. Federal law permits the sending of


A) ​unsolicited commercial e-mail.
B) ​solicited commercial e-mail only.
C) ​commercial e-mail to randomly generated addresses.
D) ​commercial e-mail to addresses "harvested" from Web sites through the use of specialized software.

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Using a domain name that is identical or similar to the trademark of a competitor represents an attempt to profit from the competitor's goodwill.

A) True
B) False

Correct Answer

verifed

verified

Federal wiretapping law covers electronic forms of communication.

A) True
B) False

Correct Answer

verifed

verified

Penalties exist for anyone who circumvents encryption software or other technological antipiracy protection.

A) True
B) False

Correct Answer

verifed

verified

BurgerBoy Restaurant Corporation allows its trademark to be used as part of a domain name for BurgerBoyNY, Inc., an unaffiliated company. BurgerBoyNY does not obtain ownership rights in the mark. This is


A) ​trademark infringement.
B) ​fair use.
C) ​a license.
D) ​trademark dilution.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

An internal company network can better protect the company's trade secrets.

A) True
B) False

Correct Answer

verifed

verified

Sales & Revenue, Inc., discovers that defamatory statements about its policies and products are being posted in an online forum. TransWeb Inc., the Internet service provider whose users are posting the messages, refuses to disclose the identity of the person or persons responsible. Sales & Revenue files a suit against the anonymous users. The plaintiff can obtain from TransWeb the identity of the persons responsible for the defamatory messages by


A) ​using the authority of the court.
B) ​gaining unauthorized access to TransWeb's servers.
C) ​deceiving TransWeb into revealing the posters' identities.
D) ​no legal or illegal means.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

"Bad faith intent" is too subjective to be an element of a cause of action under the Anticybersquatting Consumer Protection Act.

A) True
B) False

Correct Answer

verifed

verified

In an attempt to combat spam, thirty-seven states have enacted laws that prohibit or regulate its use.

A) True
B) False

Correct Answer

verifed

verified

In some states, an unsolicited e-mail must include a toll-free phone number that the recipient can use to ask the sender to send no more unsolicited e-mail.

A) True
B) False

Correct Answer

verifed

verified

Fact Pattern 14-2 CallTalk Corporation, a smartphone and phone-time seller, chooses to use and register "calltalk" as its domain name. Later, CallTalk's less successful competitor, CellTalk Company, chooses to use and register "caltalk" (an intentional misspelling of "calltalk") as its domain name. Still later, Call&Talk, Inc., uses the domain name "callltalk" (also a deliberate misspelling of "calltalk") without CallTalk's authorization, to sell pornographic phone conversations. -Refer to Fact Pattern 14-2. Call&Talk's use of the domain name "callltalk," without CallTalk's authorization, to sell pornographic phone conversations, is


A) ​a legitimate marketing technique.
B) ​a fair use.
C) ​a license.
D) ​trademark dilution.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Much of the material on the Internet, including software and database information, is not copyrighted.

A) True
B) False

Correct Answer

verifed

verified

About half of the states have enacted legislation to protect individuals from having to disclose their social media passwords.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 72

Related Exams

Show Answer