Exam 11: Cyberlaw

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Companies who have misrepresented the capabilities of their search engines or failed to disclose the methods whereby they give preference to certain links:

Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
Verified

D

Copying trademarks by using the Internet is an intellectual property issue.

Free
(True/False)
4.9/5
(33)
Correct Answer:
Verified

True

Identity theft is a type of Internet fraud.

Free
(True/False)
4.8/5
(40)
Correct Answer:
Verified

True

Bon, located in Florida, desires to enter into a contract with Jon, a resident of Maine. Neither wishes to meet face-to-face, as both are busy with a variety of business interests. Instead, they wish to form a contract over the Internet. Would a contract formed over the Internet be valid?

(Essay)
4.8/5
(37)

The Commerce Clause prohibits state governments from taxing Internet transactions.

(True/False)
4.8/5
(38)

"Pump and dump" is a practice prohibited under securities law.

(True/False)
4.9/5
(38)

Little "cyber crime" exists today.

(True/False)
4.8/5
(39)

Cyberlaw includes the area of criminal law.

(True/False)
4.9/5
(44)

The formation of contracts in cyberspace is governed today largely by:

(Multiple Choice)
5.0/5
(29)

Employers have access and control rights to their employees' e-mail.

(True/False)
4.8/5
(41)

Sam accesses the Internet and secures information (including credit history) on another person. If that information is used to purchase products in the other person's name, Sam's actions constitute:

(Multiple Choice)
4.9/5
(41)

Defamation in cyberspace requires the plaintiff to show the same elements as are required under traditional defamation law, but the potential for larger damage awards may be much greater for defamation in cyberspace.

(True/False)
4.8/5
(33)

Roxy is employed as a manager at "com.com," an Internet-based company attempting to compete successfully in the highly competitive software development industry. Roxy is concerned that one of her employees, Randy, is not performing at an acceptable level. While Roxy has noticed that Randy spends considerable time using the computer at his workstation, his productivity is lacking. Roxy suspects Randy is using the company's e-mail system for personal use instead of working on company business. Is Roxy permitted to monitor Randy's email?

(Essay)
4.8/5
(35)

The formation of contracts in cyberspace is always governed by the law of the United States.

(True/False)
4.8/5
(37)

The Internet has facilitated access to capital markets.

(True/False)
4.8/5
(36)

The legal foundation for electronic signing is provided by:

(Multiple Choice)
5.0/5
(33)

The term "cyberlaw" refers to laws and precedent applicable to Internet transactions and communications.

(True/False)
4.8/5
(41)

"Pump and Dump" is a violation of:

(Multiple Choice)
4.8/5
(41)

The taking of an image, likeness, or name for purposes of commercial advantage is protected by :

(Multiple Choice)
4.9/5
(37)

United States companies are encouraged to use an international registration system for resolving disputes regarding names for Internet sites.

(True/False)
4.7/5
(26)
Showing 1 - 20 of 52
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)