Exam 27: Cyberlaw
Exam 1: Introduction to Law43 Questions
Exam 2: Business Ethics and Social Responsibility45 Questions
Exam 3: Courts,Litigation and Alterntive Dispute Resolution45 Questions
Exam 4: Constitutional, Statutory, Administrative, and Common Law44 Questions
Exam 5: Intentional Torts and Business Torts44 Questions
Exam 6: Negligence and Strict Liability46 Questions
Exam 7: Crime44 Questions
Exam 8: International Law44 Questions
Exam 9: Introduction to Contracts47 Questions
Exam 10: Contract Impediments49 Questions
Exam 11: Conclusion to Contracts46 Questions
Exam 12: Practical Contracts46 Questions
Exam 13: Introduction to Sales46 Questions
Exam 14: Negotiable Instruments44 Questions
Exam 15: Secured Transactions45 Questions
Exam 16: Bankruptcy45 Questions
Exam 17: Agency Law46 Questions
Exam 18: Employment Law45 Questions
Exam 19: Employment Discrimination45 Questions
Exam 20: Labor Law46 Questions
Exam 21: Starting a Business: Llcs and Other Option46 Questions
Exam 22: Life and Death of a Corporation45 Questions
Exam 23: Government Regulation: Securities and Antitrust45 Questions
Exam 24: Accountants' Liability45 Questions
Exam 25: Consumer Law47 Questions
Exam 26: Environmental Law46 Questions
Exam 27: Cyberlaw43 Questions
Exam 28: Intellectual Property45 Questions
Exam 29: Real Property and Tenant: Landlord Law45 Questions
Exam 30: Personal Property and Bailment48 Questions
Exam 31: Estate Planning44 Questions
Exam 32: Insurance33 Questions
Select questions type
The Computer Fraud and Abuse Act prohibits all but which of the following?
Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
B
Rob works for a federal governmental agency.No policy statements have been reported to the employees regarding their privacy rights or regarding their use of workplace computers for personal business.Rob's supervisor has reason to suspect that Rob has used his workplace computer to order an illegal substance.Which of the following is true?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
D
Explain the difference between an ISP and a Web host,and discuss whether they are treated alike under the Communications Decency Act (CDA).
(Essay)
4.8/5
(33)
You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys.The next time you log on,your screen has a banner ad for Dallas Cowboy hats and shirts.This banner ad is most likely the result of:
(Multiple Choice)
4.9/5
(30)
Jorgeson Co.,on its website,promised the company would not give PII to third parties without the customer's consent,but then gave out such information.This practice violates Section 5 of the FTC Act.
(True/False)
4.8/5
(38)
Under the ECPA any intended recipient has the right to disclose the content of an email
(True/False)
4.8/5
(39)
After Ashley was denied credit for a new car,she checked her credit report with Equifax.The report showed that several credit cards had been issued to her recently,and they had large,unpaid balances.Ashley had not applied for or received these cards.She found out that someone had stolen personal information she had entered onto her computer and used the information to fraudulently obtain the credit cards.Ashley:
(Multiple Choice)
4.9/5
(29)
Tom receives an e-mail from someone alleging to be a Nigerian government official who has stolen money from the government.He needs some place safe to keep the money for a short time.The official promises that,if Tom lets his bank account be used for this purpose,Tom will be allowed to keep a percentage of the stolen money.Tom gives in to the temptation and provides his account information.Instead of receiving money,Tom loses everything he had in the account to the scammer.In this situation:
(Multiple Choice)
4.9/5
(28)
Lois receives an e-mail asking her to update her personal information on a website that is an illegal imitation of a legitimate site.This practice:
(Multiple Choice)
4.8/5
(33)
Which of the following protects e-mail messages from unauthorized interception?
(Multiple Choice)
5.0/5
(44)
What statute prohibits accessing a computer without authorization and obtaining information from it.?
(Multiple Choice)
4.9/5
(35)
The Children's Online Privacy Protection Act prohibits Internet operators from collecting information from children under what age without parental permission?
(Multiple Choice)
4.9/5
(39)
Stuart is vying for a promotion,but faces competition from a co-worker,Brenda.Without authorization,Stuart accesses stored company records and discovers an unfavorable e-mail message Brenda had written about the company.Stuart sends the message to his supervisor in hopes of keeping Brenda from getting the promotion.Discuss whether Stuart has violated any statute and,if so,what sanctions he may face.
(Essay)
4.9/5
(36)
Unsolicited commercial e-mail (UCE)or unsolicited bulk e-mail (UBE)messages:
(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 43
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)