Exam 11: Cyberlaw
Exam 1: The Nature and Sources of Law56 Questions
Exam 2: The Court System and Dispute Resolution57 Questions
Exam 3: Business Ethics, Social Forces, and the Law52 Questions
Exam 4: The Constitution As the Foundation of the Legal Environment55 Questions
Exam 5: Government Regulation of Competition and Prices48 Questions
Exam 6: Administrative Agencies58 Questions
Exam 7: The Legal Environment of International Trade57 Questions
Exam 8: Crimes57 Questions
Exam 9: Torts57 Questions
Exam 10: Intellectual Property Rights52 Questions
Exam 11: Cyberlaw52 Questions
Exam 12: Nature and Classes of Contracts: Contracting on the Internet53 Questions
Exam 13: Formation of Contracts: Offer and Acceptance53 Questions
Exam 14: Capacity and Genuine Assent44 Questions
Exam 15: Consideration49 Questions
Exam 16: Legality and Public Policy47 Questions
Exam 17: Writing, Electronic Forms, and Interpretation of Contracts59 Questions
Exam 18: Third Persons and Contracts51 Questions
Exam 19: Discharge of Contracts57 Questions
Exam 20: Breach of Contract and Remedies58 Questions
Exam 21: Personal Property and Bailments53 Questions
Exam 22: Legal Aspects of Supply Chain Management53 Questions
Exam 23: Nature and Form of Sales53 Questions
Exam 24: Title and Risk of Loss40 Questions
Exam 25: Product Liability: Warranties and Torts53 Questions
Exam 26: Obligations and Performance41 Questions
Exam 27: Remedies for Breach of Sales Contracts52 Questions
Exam 28: Kinds of Instruments, Parties, and Negotiability52 Questions
Exam 29: Transfers of Negotiable Instruments and Warranties of Parties52 Questions
Exam 30: Liability of the Parties Under Negotiable Instruments53 Questions
Exam 31: Checks and Funds Transfers53 Questions
Exam 32: Nature of the Debtor-Creditor Relationship53 Questions
Exam 33: Consumer Protection52 Questions
Exam 34: Secured Transactions in Personal Property52 Questions
Exam 35: Bankruptcy52 Questions
Exam 36: Insurance51 Questions
Exam 37: Agency53 Questions
Exam 38: Third Persons in Agency51 Questions
Exam 39: Regulation of Employment53 Questions
Exam 40: Equal Employment Opportunity Law53 Questions
Exam 41: Types of Business Organizations56 Questions
Exam 42: Partnerships59 Questions
Exam 43: LPS, LlCS, and LlPS44 Questions
Exam 44: Corporate Formation50 Questions
Exam 46: Securities Regulation56 Questions
Exam 47: Accountants Liability and Malpractice51 Questions
Exam 48: Management of Corporations53 Questions
Exam 49: Real Property53 Questions
Exam 50: Environmental Law and Land Use Controls54 Questions
Exam 51: Leases51 Questions
Exam 52: Decedents Estates and Trusts53 Questions
Select questions type
Companies who have misrepresented the capabilities of their search engines or failed to disclose the methods whereby they give preference to certain links:
Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
D
Copying trademarks by using the Internet is an intellectual property issue.
Free
(True/False)
4.9/5
(33)
Correct Answer:
True
Identity theft is a type of Internet fraud.
Free
(True/False)
4.8/5
(40)
Correct Answer:
True
Bon, located in Florida, desires to enter into a contract with Jon, a resident of Maine. Neither wishes to meet face-to-face, as both are busy with a variety of business interests. Instead, they wish to form a contract over the Internet. Would a contract formed over the Internet be valid?
(Essay)
4.8/5
(37)
The Commerce Clause prohibits state governments from taxing Internet transactions.
(True/False)
4.8/5
(38)
The formation of contracts in cyberspace is governed today largely by:
(Multiple Choice)
5.0/5
(29)
Employers have access and control rights to their employees' e-mail.
(True/False)
4.8/5
(41)
Sam accesses the Internet and secures information (including credit history) on another person. If that information is used to purchase products in the other person's name, Sam's actions constitute:
(Multiple Choice)
4.9/5
(41)
Defamation in cyberspace requires the plaintiff to show the same elements as are required under traditional defamation law, but the potential for larger damage awards may be much greater for defamation in cyberspace.
(True/False)
4.8/5
(33)
Roxy is employed as a manager at "com.com," an Internet-based company attempting to compete successfully in the highly competitive software development industry. Roxy is concerned that one of her employees, Randy, is not performing at an acceptable level. While Roxy has noticed that Randy spends considerable time using the computer at his workstation, his productivity is lacking. Roxy suspects Randy is using the company's e-mail system for personal use instead of working on company business. Is Roxy permitted to monitor Randy's email?
(Essay)
4.8/5
(35)
The formation of contracts in cyberspace is always governed by the law of the United States.
(True/False)
4.8/5
(37)
The legal foundation for electronic signing is provided by:
(Multiple Choice)
5.0/5
(33)
The term "cyberlaw" refers to laws and precedent applicable to Internet transactions and communications.
(True/False)
4.8/5
(41)
The taking of an image, likeness, or name for purposes of commercial advantage is protected by :
(Multiple Choice)
4.9/5
(37)
United States companies are encouraged to use an international registration system for resolving disputes regarding names for Internet sites.
(True/False)
4.7/5
(26)
Showing 1 - 20 of 52
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)