Filters
Question type

Study Flashcards

An employer may have a right to terminate a person based on his or her violation of the employer's social media policy.

Correct Answer

verifed

verified

True

Fact Pattern 9-1 Sound Financials Corporation sends daily e-mail ads to its previous customers and those who have opted to receive the notices.Instable Investments,Inc.,sends e-mail ads to any e-mail address that Instable can find on the Web or otherwise generate. -Refer to Fact Pattern 9-1.One of the advertisers-either Sound Financials or Instable Investments-is acting within the bounds of federal law.Federal law permits the sending of​


A) unsolicited commercial e-mail.
B) solicited commercial e-mail only.
C) commercial e-mail to randomly generated addresses.
D) commercial e-mail to addresses "harvested" from Web sites through the use of specialized software.

Correct Answer

verifed

verified

To protect domain name rights from would-be cybersquatters and typosquatters,AgriBusiness Inc.and other large corporations may have to​


A) register thousands of domain names across the globe.
B) pay the owners of Web sites with identical or confusingly similar domain names for the number of unique visits,or hits,to the sites.
C) change their domain names to avoid identical or confusingly similar domain names.
D) change their trademarks to avoid identical or confusingly similar domain names.

Correct Answer

verifed

verified

Federal wiretapping law covers electronic forms of communication.

Correct Answer

verifed

verified

Cybersquatting is illegal only if a domain name is identical to the trademark of another,not if the name is merely confusingly similar.

Correct Answer

verifed

verified

Fact Pattern 9-2 CallTalk Corporation,a smartphone and phone-time seller,chooses to use and register "calltalk" as its second-level domain.Later,CallTalk's less successful competitor,CellTalk Company,chooses to use and register "caltalk" (an intentional misspelling of "calltalk") as its second-level domain.Still later,Call&Talk,Inc.,uses the domain name "callltalk" (also a deliberate misspelling of "calltalk") without CallTalk's authorization,to sell pornographic phone conversations. -Refer to Fact Pattern 9-2.By using a similar domain name to CallTalk's,CellTalk is most likely attempting to profit from its competitor's​


A) goodwill.
B) fair use.
C) license.
D) safe harbor.

Correct Answer

verifed

verified

A

Law enforcement uses social media to detect and prosecute criminals.

Correct Answer

verifed

verified

True

InfoFree Inc.,makes and sells devices and services for the circumvention of encryption software and other technological antipiracy protection.Under the Digital Millennium Copyright Act,this is​


A) a violation of copyright law.
B) prohibited but not a violation of copyright law.
C) a "fair use" exception to the provisions of the act.
D) permitted for reconsideration every three years.

Correct Answer

verifed

verified

Federal law permits the sending of unsolicited commercial e-mail and does not prohibit spamming activities.

Correct Answer

verifed

verified

The manufacture,import,sale,and distribution of devices or services for the circumvention of encryption software is prohibited.

Correct Answer

verifed

verified

Stefano transfers copyrighted music recordings,without the copyright owners' authorization,to his friends.This is​


A) copyright infringement.
B) a license.
C) a safe harbor.
D) none of the choices.

Correct Answer

verifed

verified

Dona downloads music into her computer's random access memory,or RAM,without authorization.This is​


A) copyright infringement.
B) within Dona's rights as a computer user.
C) a basis of liability for the computer maker if it does not act against Dona.
D) none of the choices.

Correct Answer

verifed

verified

It is frequently the companies rather than courts or legislatures that are defining the privacy rights of their online users.

Correct Answer

verifed

verified

Fact Pattern 9-2 CallTalk Corporation,a smartphone and phone-time seller,chooses to use and register "calltalk" as its second-level domain.Later,CallTalk's less successful competitor,CellTalk Company,chooses to use and register "caltalk" (an intentional misspelling of "calltalk") as its second-level domain.Still later,Call&Talk,Inc.,uses the domain name "callltalk" (also a deliberate misspelling of "calltalk") without CallTalk's authorization,to sell pornographic phone conversations. -Refer to Fact Pattern 9-2.CallTalk wants to sue Call&Talk for its unauthorized use of the domain name "callltalk." Before bringing the suit,CallTalk has to ask the court for a subpoena to discover​


A) the true identity of the owner of the unauthorized site.
B) the amount of the profits of the unauthorized site.
C) the estimated costs of the court proceedings and discovery.
D) all of the registered variations of the name "calltalk."

Correct Answer

verifed

verified

No federal court has held that digitally sampling a copyrighted sound recording of any length constitutes copyright infringement.

Correct Answer

verifed

verified

Cybersquatting occurs when key words are inserted into the hyper text markup language code to tell Internet browsers specific information about a Web page.

Correct Answer

verifed

verified

Fact Pattern 9-2 CallTalk Corporation,a smartphone and phone-time seller,chooses to use and register "calltalk" as its second-level domain.Later,CallTalk's less successful competitor,CellTalk Company,chooses to use and register "caltalk" (an intentional misspelling of "calltalk") as its second-level domain.Still later,Call&Talk,Inc.,uses the domain name "callltalk" (also a deliberate misspelling of "calltalk") without CallTalk's authorization,to sell pornographic phone conversations. -Refer to Fact Pattern 9-2.Call&Talk's use of the domain name "callltalk," without CallTalk's authorization,to sell pornographic phone conversations,is​


A) goodwill.
B) fair use.
C) a license.
D) trademark dilution.

Correct Answer

verifed

verified

Employees' posts on social media may be protected under labor laws.

Correct Answer

verifed

verified

Federal law prohibits the Federal Trade Commission from cooperating and sharing information with foreign agencies in investigating and prosecuting those involved in spamming.

Correct Answer

verifed

verified

The law does not restrict the "fair use" of methods for the circumvention of encryption software or other technological antipiracy protection for educational and other noncommercial purposes.

Correct Answer

verifed

verified

Showing 1 - 20 of 72

Related Exams

Show Answer