Filters
Question type

Study Flashcards

How much regulation of Internet content should be permissible? How does the Internet differ from television and how is it similar with respect to this issue? How should children's access enter into the analysis?

Correct Answer

verifed

verified

Even if the government tried to strictly...

View Answer

Ingrid works for a large wholesale operation in the finance department of a corporation.In connection with the investigation of suspected embezzlement,her employer looked at her saved e-mail at work.Ingrid's employer then,from some forwarded messages,discovered her home e-mail address and convinced the Internet service provider to allow it access to that as well.Apparently,Ingrid has become a suspect in the embezzlement investigation.The police have become involved.Discuss this situation.

Correct Answer

verifed

verified

The company is able to read Ingrid's wor...

View Answer

The Electronic Communications Privacy Act applies in each of the following situations,making,the action illegal,except:


A) Mike, Kathy's boyfriend, has placed a program on Kathy's computer which automatically sends a copy of every e-mail she sends to the recipient and a copy to Mike's computer without Kathy's knowledge.
B) Mike, Kathy's boyfriend, is sitting in his car outside of Kathy's home with a device that allows him to see copies of any e-mail that Kathy sends, even though he hasn't installed any programs on her computer.
C) Mike, Kathy's boyfriend, hacks into the server at Kathy's office and reads the e-mail that Kathy has sent for the past 48 hours.
D) Mike, Kathy's employer, places a program on her work computer to monitor e-mail transmissions sent.
E) Mike, an FBI agent, places a program on Kathy's computer without obtaining a search warrant to monitor her e-mail because she is a prime suspect in an ongoing criminal investigation.

Correct Answer

verifed

verified

Limitations of remedies in licenses subject to UCITA are ________.


A) unenforceable
B) unenforceable, barring unjust enrichment
C) enforceable
D) enforceable, unless they are unconscionable
E) enforceable in equity, but not by law

Correct Answer

verifed

verified

Which of the following is one of the most commonly used top-level extensions for domain names?


A) .avia
B) .aero
C) .flite
D) .arwys
E) .flght

Correct Answer

verifed

verified

John works for a company that provides computers and access to a service provider that provides access to the Internet,as well as an e-mail address for all employees.While at work,John often accesses the e-mail account that he uses at home.John's employer would like to access John's e-mail to see if he is using company time for personal purposes.Which of the following is true?


A) The company must get a search warrant before it can access any of John's stored e-mail.
B) The company can have access to e-mail stored at John's work e-mail address, but not that stored at the e-mail address he usually accesses from home.
C) The company can have access to e-mail stored at either location if the e-mail at the address he accesses from home was sent or received during John's time at work.
D) The company cannot access any of John's stored e-mail unless it obtains the assistance of law enforcement personnel and obtains a search warrant.
E) The company cannot access any of John's stored e-mail and would not have grounds for a search warrant.

Correct Answer

verifed

verified

Under UCITA,available remedies are specifically enumerated and the parties do not have the right to limit remedies in their contract or licensing agreement.

Correct Answer

verifed

verified

Internet service providers (ISPs)are not liable for the content transmitted over their networks by e-mail users and websites.

Correct Answer

verifed

verified

An intellectual property licensing arrangement is a method used to transfer certain rights of use,but not ownership,of intellectual property.

Correct Answer

verifed

verified

The CAN-SPAM Act is designed to eliminate spam.

Correct Answer

verifed

verified

The E-SIGN Act provides that a digital signature can be verified in which of the following ways?


A) by something the signatory knows, such as a secret password
B) by one (1) attesting witness
C) by diametrics
D) by judicial decree
E) by digital signature analysis (the modern equivalent of handwriting analysis)

Correct Answer

verifed

verified

Chris and Bob,college students and athletes,became concerned about the amount of information on the Internet that promotes unhealthy food consumption in children.They decided to lobby their representatives regarding passage of a law criminalizing the transmission of information accessible by children that encourages unhealthy food consumption.Are Chris and Bob likely to be successful in their efforts,and why or why not?

Correct Answer

verifed

verified

No,they are not likely to be successful....

View Answer

The CAN-SPAM Act prohibits spammers from using falsified headers in e-mail messages,including the originating domain name and e-mail address.

Correct Answer

verifed

verified

The Interstate Commerce Commission (ICC),a federal administrative agency,is empowered to enforce the CAN-SPAM Act.

Correct Answer

verifed

verified

Which types of names are protected under the Anti-Cybersquatting Consumer Protection Act?


A) any name of a natural person
B) names of famous persons
C) names of famous companies, but only if the name is trademarked
D) names of famous persons or of famous companies, but only if the name is trademarked
E) names of famous persons or of famous companies, even if the name is not trademarked.

Correct Answer

verifed

verified

The CAN-SPAM Act requires that recipients of spam be given the opportunity to opt out and not have the spammer send e-mail to the recipient's address.

Correct Answer

verifed

verified

Lance,a consumer,accesses JGBikes,an Internet bicycle products site and wants to order 5 bicycle tubes.When he types in the number,he accidentally types in 55.JGBike's site shows a page with the order details and requires Lance to click accept.After he clicks accept,another page comes up called an "Order Confirmation Verification Page" which requires him to accept again.Lance does so.By accepting,JGBike is authorized to withdraw the contract cost from the bank account that Lance provided,which they immediately do.The next morning he notices the fact that he ordered 55 tubes rather than 5.He calls JGBikes and discovers that the order has already been shipped.He informs them of the mistaken order and offers to return the 50 tubes or destroy them at JGBike's option.JGBikes informs Lance that the order is final and that they will neither accept a return nor refund his money.If Lance sues,what will be the outcome?

Correct Answer

verifed

verified

Lance will be unsuccessful because the s...

View Answer

The Uniform Computer Information Transactions Act was passed by the U.S.Congress in 1999.

Correct Answer

verifed

verified

The Uniform Computer Information Transactions Act provides that if appropriate requirements are met,a licensor can resort to electronic self-help if a breach occurs.

Correct Answer

verifed

verified

The World Wide Web consists of millions of computers that support a standard set of rules for the exchange of information called Hypertext Transfer Protocol.

Correct Answer

verifed

verified

Showing 61 - 80 of 114

Related Exams

Show Answer