Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Mike, Kathy's boyfriend, has placed a program on Kathy's computer which automatically sends a copy of every e-mail she sends to the recipient and a copy to Mike's computer without Kathy's knowledge.
B) Mike, Kathy's boyfriend, is sitting in his car outside of Kathy's home with a device that allows him to see copies of any e-mail that Kathy sends, even though he hasn't installed any programs on her computer.
C) Mike, Kathy's boyfriend, hacks into the server at Kathy's office and reads the e-mail that Kathy has sent for the past 48 hours.
D) Mike, Kathy's employer, places a program on her work computer to monitor e-mail transmissions sent.
E) Mike, an FBI agent, places a program on Kathy's computer without obtaining a search warrant to monitor her e-mail because she is a prime suspect in an ongoing criminal investigation.
Correct Answer
verified
Multiple Choice
A) unenforceable
B) unenforceable, barring unjust enrichment
C) enforceable
D) enforceable, unless they are unconscionable
E) enforceable in equity, but not by law
Correct Answer
verified
Multiple Choice
A) .avia
B) .aero
C) .flite
D) .arwys
E) .flght
Correct Answer
verified
Multiple Choice
A) The company must get a search warrant before it can access any of John's stored e-mail.
B) The company can have access to e-mail stored at John's work e-mail address, but not that stored at the e-mail address he usually accesses from home.
C) The company can have access to e-mail stored at either location if the e-mail at the address he accesses from home was sent or received during John's time at work.
D) The company cannot access any of John's stored e-mail unless it obtains the assistance of law enforcement personnel and obtains a search warrant.
E) The company cannot access any of John's stored e-mail and would not have grounds for a search warrant.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) by something the signatory knows, such as a secret password
B) by one (1) attesting witness
C) by diametrics
D) by judicial decree
E) by digital signature analysis (the modern equivalent of handwriting analysis)
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) any name of a natural person
B) names of famous persons
C) names of famous companies, but only if the name is trademarked
D) names of famous persons or of famous companies, but only if the name is trademarked
E) names of famous persons or of famous companies, even if the name is not trademarked.
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Showing 61 - 80 of 114
Related Exams