Filters
Question type

Study Flashcards

Federal law permits the intentional interception of any wire,oral,or electronic communication. 

Correct Answer

verifed

verified

Riley obtains permission from Saga Company to use the firm's game app on Riley's smartphone,tablet,and other mobile device.But Riley does not obtain ownership rights in the app.This is 


A)  ​a license. 
B)  ​a cookie. 
C)  ​cloud computing. 
D)  ​a violation of the law.

Correct Answer

verifed

verified

Cybersquatting occurs when key words are inserted into a Web site's key-words coding to tell Internet browsers specific information about a Web page. 

Correct Answer

verifed

verified

Global Reach Corporation uses invisible files created on the computers,smartphones,and other mobile devices of visitors to its Web sites to track the users' browsing activities.These files are​ 


A)  ​licenses. 
B)  ​cookies. 
C)  ​cloud computing. 
D)  ​a violation of the law.

Correct Answer

verifed

verified

BurgerBoy Restaurant Corporation allows its trademark to be used as part of a domain name for BurgerBoy NY,Inc.,an unaffiliated company.BurgerBoy NY does not obtain ownership rights in the mark.This is​ 


A)  ​trademark infringement. 
B)  ​fair use. 
C)  ​a license. 
D)  ​trademark dilution.

Correct Answer

verifed

verified

Federal law permits the intentional accessing of stored electronic communication even if the accessing is unauthorized. 

Correct Answer

verifed

verified

BeFriends Corporation uses the trademark of Community Life Inc.,a social media site,as a meta tag without Community Life's permission.This may be permissible​ 


A)  ​if the appropriating site has nothing to do with the meta tag. 
B)  ​if the two sites appear in the same search engine results. 
C)  ​if the use constitutes trademark infringement. 
D)  ​under no circumstances.

Correct Answer

verifed

verified

Federal law prohibits the Federal Trade Commission from cooperating and sharing information with foreign agencies in investigating and prosecuting those involved in spamming. 

Correct Answer

verifed

verified

Social media posts are routinely included in discovery in litigation. 

Correct Answer

verifed

verified

Employees,clients,and others with authorization use World Transport Corporation's network around the globe to share computer files.This is​ 


A)  ​an invasion of privacy. 
B)  ​trademark and copyright infringement. 
C)  ​digital sampling. 
D)  ​a distributed network.

Correct Answer

verifed

verified

Sonya and other employees of TransGlobal Inc.maintain a password-protected social media page on which they post comments on work-related issues.The posts range from positive to negative,supporting the page's purpose to "vent about work." When TransGlobal learns of the page,the company intimidates Sonya into revealing the password,and after reviewing the posts,fires her and the other participants.Which federal law discussed in thisChapter most likely applies to this situation? Has this law been violated? Discuss.

Correct Answer

verifed

verified

The federal law discussed in this chapte...

View Answer

Without authorization,Brady uses the trademark of Ciera Coffee Company to promote cheap,flavorless candy,which is not similar to Ciera's products but diminishes the quality of the coffee company's mark.This is​ 


A)  ​cybersquatting. 
B)  typosquatting.​ 
C)  ​trademark infringement. 
D)  ​trademark dilution.

Correct Answer

verifed

verified

Zoe and other users of Facebook and other social networking sites post trademarked images and copyrighted materials on these sites without permission.This​ 


A)  ​is a violation of the intellectual property rights of the owners of the images and materials. 
B)  ​is within the rights of the users of social networks. 
C)  ​is a subject for dispute resolution by the providers of the social networks. 
D)  ​falls under the "business-extension exception" to the Electronic Communications Privacy Act.

Correct Answer

verifed

verified

Social media users can post trademarked images or copyrights materials without infringing the owners' rights,even if it is done without permission. 

Correct Answer

verifed

verified

Fact Pattern 7-2CallTalk Corporation, a smartphone and phone-time seller, chooses to use and register "calltalk" as its domain name. Later, CallTalk's less successful competitor, CellTalk Company, chooses to use and register "caltalk" (an intentional misspelling of "calltalk") as its domain name. Still later, Call&Talk, Inc., uses the domain name "callltalk" (also a deliberate misspelling of "calltalk") without CallTalk's authorization, to sell pornographic phone conversations. -Refer to Fact Pattern 7-2.Call&Talk's use of the domain name "callltalk," without CallTalk's authorization,to sell pornographic phone conversations,is​ 


A)  ​a legitimate marketing technique. 
B)  ​a fair use. 
C)  ​a license. 
D)  ​trademark dilution.

Correct Answer

verifed

verified

Refer to Fact Pattern 7-1.In those states with anti spam laws,federal law​ 


A)  ​prohibits or regulates the use of spam. 
B)  ​requires the use of spam by business entities. 
C)  ​bans the use of spam altogether. 
D)  ​preempts the application of state law to commercial e-mail with certain exceptions.

Correct Answer

verifed

verified

Interactive Entertainment Corporation markets its products online.Through the use of cookies,Interactive Entertainment and other online marketers can​ 


A)  ​track individuals' Web browsing activities. 
B)  ​gain access to competitors' servers. 
C)  ​"sweet talk" consumers into buying certain products. 
D)  ​attack competitors' Web sites.

Correct Answer

verifed

verified

ConnectWeb,Inc.,operates a subscription-based service that extends the software and storage capabilities of its subscribers.This is​ 


A)  ​dilution. 
B)  ​peer-to-peer (P2P) networking. 
C)  ​cloud computing. 
D)  ​a distributed network.

Correct Answer

verifed

verified

Because of the loss of significant amounts of revenue as a result of unauthorized digital downloads,file-sharing has created problems for​ 


A)  ​the motion picture industry. 
B)  ​recording artists and their labels. 
C)  ​the companies that distribute file-sharing software. 
D)  ​all of the choices.

Correct Answer

verifed

verified

A licensor might grant a license allowing a trademark to be used as part of a domain name. 

Correct Answer

verifed

verified

Showing 21 - 40 of 72

Related Exams

Show Answer