Exam 50: Torts and Crimes
Exam 1: Law and Legal Reasoning72 Questions
Exam 2: Business and the Constitution72 Questions
Exam 3: Ethics in Business72 Questions
Exam 4: Courts and Alternative Dispute Resolution72 Questions
Exam 5: Court Procedures72 Questions
Exam 6: Tort Law72 Questions
Exam 7: Strict Liability and Product Liability72 Questions
Exam 8: Intellectual Property Rights72 Questions
Exam 9: Internet Law Social Media and Privacy72 Questions
Exam 10: Criminal Law and Cyber Crime72 Questions
Exam 11: Nature and Terminology72 Questions
Exam 12: Agreement72 Questions
Exam 13: Consideration72 Questions
Exam 14: Capacity and Legality72 Questions
Exam 15: Mistakes Fraud and Voluntary Consent72 Questions
Exam 16: The Writing Requirement72 Questions
Exam 17: Third Party Rights72 Questions
Exam 18: Performance and Dischapterarge72 Questions
Exam 19: Breachapter of Contract and Remedies72 Questions
Exam 20: Sales and Lease Contracts72 Questions
Exam 21: Title Risk and Insurable Interest72 Questions
Exam 22: Performance and Breachapter of Sales and Lease Contracts72 Questions
Exam 23: Warranties72 Questions
Exam 24: International and Space Law72 Questions
Exam 25: Negotiable Instruments72 Questions
Exam 26: Transferability and Holder in Due Course72 Questions
Exam 27: Liability Defenses and Dischapterarge72 Questions
Exam 28: Banking72 Questions
Exam 29: Creditors Rights and Remedies72 Questions
Exam 30: Secured Transactions73 Questions
Exam 31: Bankruptcy Law72 Questions
Exam 32: Agency Formation and Duties144 Questions
Exam 33: Employment Immigration and Labor Law144 Questions
Exam 34: Small Businesses and Franchapterises72 Questions
Exam 35: All Forms of Partnerships72 Questions
Exam 36: Limited Liability Companies and Special Business Forms72 Questions
Exam 37: Corporate Formation and Financing144 Questions
Exam 38: Mergers and Takeovers72 Questions
Exam 39: Investor Protection Insider Trading and Corporate Governance72 Questions
Exam 40: Administrative Agencies72 Questions
Exam 41: Consumer Law72 Questions
Exam 42: Environmental Protection72 Questions
Exam 43: Antitrust Law72 Questions
Exam 42: Professional Liability and Accountability72 Questions
Exam 45: Personal Property and Bailments72 Questions
Exam 46: Real Property and Landlord Tenant Law72 Questions
Exam 47: Insurance72 Questions
Exam 48: Wills and Trusts73 Questions
Exam 49: The Legal Environment of Business14 Questions
Exam 50: Torts and Crimes12 Questions
Exam 51: Contracts and E Contracts10 Questions
Exam 52: Domestic and International Sales and Lease Contracts8 Questions
Exam 53: Negotiable Instruments6 Questions
Exam 54: Creditors Rights and Bankruptcy10 Questions
Exam 55: Agency and Employment12 Questions
Exam 56: Business Organizations14 Questions
Exam 57: Government Regulation12 Questions
Exam 58: Property and Its Protection10 Questions
Select questions type
Libby and Marco take photos of themselves in intimate moments. When their relationship ends, Marco posts the photos online without Libby's consent in an attempt to humiliate her. Included with the photos are Libby's name, Facebook page, address, workplace, and phone number. This could be a ground for a civil suit on the basis of
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
C
Opiate Company markets a product using a trademark of Pharma Ltd. that is not registered in this country and has never otherwise been used here. Pharma did not authorize Opiate's use. Under the Lanham Act, Pharma can
Free
(Multiple Choice)
5.0/5
(29)
Correct Answer:
A
The existence of an ethical duty on the part of Commerce & Trade Company, and other businesses, to prevent an attack by hackers on business computer systems, and consequent theft of customers' and employees' personal data, is evidenced by
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
A
USA Sales Company publishes a "Privacy Policy" to attract customers, but fails to invest adequate resources in cyber security. A lack of security that allows hackers to steal customers' personal data from a business's computer system can be
(Multiple Choice)
4.8/5
(44)
Yun Ltd. circumvents the anti-cheating code of Zen LLC's free online video game to learn how to automate gameplay to perform with enhanced accuracy. Yun's site sells the knowledge to players who can then outplay less-informed players. Yun most likely violated the Digital Millennium Copyright Act by
(Multiple Choice)
4.8/5
(36)
The intentional use of electronic communications systems to place another in reasonable fear of death or serious bodily injury is a crime under
(Multiple Choice)
4.8/5
(31)
When a registered trademark is infringed to sell a product, the owner of the mark can succeed in an action against the infringer on showing that the defendant's use of the mark
(Multiple Choice)
4.9/5
(25)
Sending a strobe-light image within a tweet that induces a seizure in an epileptic recipient could subject its sender to arrest
(Multiple Choice)
4.8/5
(37)
Hackers infiltrate the computer system of ChemCo Inc. and steal the company's trade secrets. If the hackers can be identified, they can be
(Multiple Choice)
4.9/5
(38)
Hackers infiltrate the computer system of Metro Bank and steal the personal information of Metro's customers and employees. Individuals whose personal information is involved in the breach should be notified, as required by law in
(Multiple Choice)
4.8/5
(34)
Han and Ivy take photos of themselves in intimate moments. When their relationship ends, Han posts the photos online without Ivy's consent in an attempt to humiliate her. This is a crime in
(Multiple Choice)
4.9/5
(35)
Without authorization, Wei LLC copies Xi Inc.'s free online video game-its champions, their abilities, the sound effects, and the icons-and markets the copy under different names. Xi copies its own game to produce and sell a version for mobile platforms. Copyright issues are most likely to arise with
(Multiple Choice)
4.8/5
(38)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)