Filters
Question type

Study Flashcards

Employees of Bodegas & Bistros Inc.(B&B) maintain a password-protected social media page to "vent about work." When B&B learns of the page,the company intimidates the network that operates it into revealing the password.After reviewing the posts,B&B fires the participants.Most likely,this is


A) a violation of the Stored Communications Act.
B) within B&B's rights as an employer.
C) a subject for dispute resolution by B&B's Internet service.
D) a "business-extension exception" under the Electronic Communications Privacy Act.

Correct Answer

verifed

verified

Web Marketing Inc.buys and sells domain names with the click of a mouse.A domain name can be bought and sold many times.Each change of owner is registered automatically as part of a mass registration.In this environment


A) cybersquatting can flourish.
B) typosquatting occurs unintentionally through clerical misspellings.
C) brands and trademarks are automatically protected from cybersquatters.
D) the Federal Trade Commission can sanction Web Marketing.

Correct Answer

verifed

verified

Jason transfers select copyrighted music recordings,without the copyright owners' authorization,through his computer and phone to his friends.Jason does not charge his friends for his "service." This is


A) copyright infringement.
B) a license.
C) goodwill.
D) "fair use."

Correct Answer

verifed

verified

An Internet service provider is liable for any act of copyright infringement by its customer.

Correct Answer

verifed

verified

About half of the states have enacted legislation to protect individuals from having to disclose their social media passwords.

Correct Answer

verifed

verified

In an attempt to combat spam,thirty-seven states have enacted laws that prohibit or regulate its use.

Correct Answer

verifed

verified

Cybersquatting occurs when key words are inserted into a Web site's keywords coding to tell Internet browsers specific information about a Web page.

Correct Answer

verifed

verified

Fact Pattern 9-2​ CallTalk Corporation,a smartphone and phone-time seller,chooses to use and register "calltalk" as its domain name.Later,CallTalk's less successful competitor,CellTalk Company,chooses to use and register "caltalk" (an intentional misspelling of "calltalk") as its domain name.Still later,Call&Talk,Inc. ,uses the domain name "callltalk" (also a deliberate misspelling of "calltalk") without CallTalk's authorization,to sell pornographic phone conversations. -Refer to Fact Pattern 9-2.Call&Talk's use of the domain name "callltalk," without CallTalk's authorization,to sell pornographic phone conversations,is


A) a legitimate marketing technique.
B) a fair use.
C) a license.
D) trademark dilution.

Correct Answer

verifed

verified

Fact Pattern 9-1​ Sound Financials Corporation sends daily e-mail ads to its previous customers and those who have opted to receive the notices.Instable Investments,Inc. ,sends e-mail ads to any e-mail address that Instable can find on the Web or otherwise generate. -Refer to Fact Pattern 9-1.One of the advertisers-either Sound Financials or Instable Investments-is acting within the bounds of federal law.Federal law permits the sending of


A) unsolicited commercial e-mail.
B) solicited commercial e-mail only.
C) commercial e-mail to randomly generated addresses.
D) commercial e-mail to addresses "harvested" from Web sites through the use of specialized software.

Correct Answer

verifed

verified

When you download an application on your smartphone,you are typically entering into a license agreement.

Correct Answer

verifed

verified

"Bad faith intent" is too subjective to be an element of a cause of action under the Anticybersquatting Consumer Protection Act.

Correct Answer

verifed

verified

In some states,an unsolicited e-mail must include a toll-free phone number that the recipient can use to ask the sender to send no more unsolicited e-mail.

Correct Answer

verifed

verified

Employees,clients,and others with authorization use World Transport Corporation's network around the globe to share computer files.This is


A) an invasion of privacy.
B) trademark and copyright infringement.
C) digital sampling.
D) a distributed network.

Correct Answer

verifed

verified

Online defamation is wrongfully hurting a person's reputation by communicating false statements about that person to others online.

Correct Answer

verifed

verified

Downloading music into a computer's random access memory,or RAM,is not copyright infringement,even if it is done without authorization.

Correct Answer

verifed

verified

ConnectWeb,Inc. ,operates a subscription-based service that extends the software and storage capabilities of its subscribers.This is


A) dilution.
B) peer-to-peer (P2P) networking.
C) cloud computing.
D) a distributed network.

Correct Answer

verifed

verified

An internal company network can better protect the company's trade secrets.

Correct Answer

verifed

verified

Sonya and other employees of TransGlobal Inc.maintain a password-protected social media page on which they post comments on work-related issues.The posts range from positive to negative,supporting the page's purpose to "vent about work." When TransGlobal learns of the page,the company intimidates Sonya into revealing the password,and after reviewing the posts,fires her and the other participants.Which federal law discussed in this chapter most likely applies to this situation? Has this law been violated? Discuss.

Correct Answer

verifed

verified

The federal law discussed in this chapte...

View Answer

Using another's trademark in a meta tag does not normally constitute trademark infringement,even if it is done without the owner's permission.

Correct Answer

verifed

verified

Federal law permits the sending of unsolicited commercial e-mail and does not prohibit spamming activities.

Correct Answer

verifed

verified

Showing 41 - 60 of 72

Related Exams

Show Answer