Exam 15: Digital Law and E-Commerce

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ________ is a federal statute that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.

Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
Verified

B

Jesse owns a computer on which she sends and receives email.Abe monitors the emails sent and received by Jesse from her email account.Under which of the following circumstances would the ECPA consider Abe's actions as not violating the law?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

B

The difference between trademark laws and the Anticybersquatting Consumer Protection Act is that,the latter ________.

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

B

The UCITA was drafted to address the problems of enforcing e-commerce contracts and providing consumer protection.

(True/False)
4.8/5
(32)

A ________ refers to a party who is granted limited rights in or access to intellectual property or informational rights owned by another party.

(Multiple Choice)
4.9/5
(35)

Explain the circumstances under which email contracts are legally enforceable?

(Essay)
4.8/5
(33)

The computers that constitute the World Wide Web use a standard set of rules known as ________ for the exchange of information.

(Multiple Choice)
4.8/5
(21)

Timothy is a dentist who has a private clinic in Detroit.Which of the following would be an example of him using a new,personalized top-level domain?

(Multiple Choice)
4.7/5
(38)

Which of the following top-level domain name extensions is most commonly used by ISPs,Web-hosting companies,and other businesses that are directly involved in the infrastructure of the Internet?

(Multiple Choice)
4.9/5
(30)

The ECPA is a federal statute that ________.

(Multiple Choice)
4.9/5
(28)

Jenny owns a computer on which she sends and receives email.Leonard learns Jenny's access code to her email account.Leonard opens Jenny's email and reads her emails.Leonard has violated the Electronic Communications Privacy Act.

(True/False)
4.9/5
(33)

Companies that provide businesses and individuals with Internet access are responsible for the content transmitted over their networks.

(True/False)
4.8/5
(42)

Which of the following does the E-SIGN Act provide?

(Multiple Choice)
5.0/5
(29)

Discuss arguments against Internet service providers being held liable for content transmitted over their network by email users and websites.

(Essay)
4.9/5
(33)

Country-specific domain names can be purchased privately for commercial use.

(True/False)
4.7/5
(39)

Which of the following is true of e-commerce?

(Multiple Choice)
4.7/5
(29)

A ________ is an owner of intellectual property or informational rights who transfers rights in the property or information to another party.

(Multiple Choice)
4.9/5
(42)

Jessica wants to buy a laptop from the Tenn Computers' website.Before confirming the purchase,the website asks her to provide biometric identification using an electronic scanner.This is an example of ________.

(Multiple Choice)
4.8/5
(26)

A(n)________ is a detailed and comprehensive written contract that sets forth the express terms of a contract between two parties transferring the rights to an intellectual property.

(Multiple Choice)
4.9/5
(36)

The ________ Act establishes a uniform and comprehensive set of rules that govern the creation,performance,and enforcement for computer information transactions.

(Multiple Choice)
4.9/5
(29)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)