Exam 11: Cyberlaw
Exam 1: The Nature and Sources of Law56 Questions
Exam 2: The Court System and Dispute Resolution57 Questions
Exam 3: Business Ethics, Social Forces, and the Law52 Questions
Exam 4: The Constitution As the Foundation of the Legal Environment57 Questions
Exam 5: Government Regulation of Competition and Prices48 Questions
Exam 6: Administrative Agencies58 Questions
Exam 7: The Legal Environment of International Trade57 Questions
Exam 8: Crimes57 Questions
Exam 9: Torts58 Questions
Exam 10: Intellectual Property Rights52 Questions
Exam 11: Cyberlaw52 Questions
Exam 12: Nature and Classes of Contracts: Contracting on the Internet53 Questions
Exam 13: Formation of Contracts: Offer and Acceptance53 Questions
Exam 14: Capacity and Genuine Assent44 Questions
Exam 15: Consideration49 Questions
Exam 16: Legality and Public Policy48 Questions
Exam 17: Writing, Electronic Forms, and Interpretation of Contracts59 Questions
Exam 18: Third Persons and Contracts51 Questions
Exam 19: Discharge of Contracts57 Questions
Exam 20: Breach of Contract and Remedies58 Questions
Exam 21: Personal Property and Bailments53 Questions
Exam 22: Legal Aspects of Supply Chain Management53 Questions
Exam 23: Nature and Form of Sales53 Questions
Exam 24: Title and Risk of Loss40 Questions
Exam 25: Product Liability: Warranties and Torts53 Questions
Exam 26: Obligations and Performance42 Questions
Exam 27: Remedies for Breach of Sales Contracts53 Questions
Exam 28: Kinds of Instruments, Parties, and Negotiability52 Questions
Exam 29: Transfers of Negotiable Instruments and Warranties of Parties53 Questions
Exam 30: Liability of the Parties Under Negotiable Instruments53 Questions
Exam 31: Checks and Funds Transfers53 Questions
Exam 32: Nature of the Debtor-Creditor Relationship53 Questions
Exam 33: Consumer Protection53 Questions
Exam 34: Secured Transactions in Personal Property52 Questions
Exam 35: Bankruptcy53 Questions
Exam 36: Insurance53 Questions
Exam 37: Agency53 Questions
Exam 38: Third Persons in Agency53 Questions
Exam 39: Regulation of Employment53 Questions
Exam 40: Equal Employment Opportunity Law53 Questions
Exam 41: Types of Business Organizations56 Questions
Exam 42: Partnerships60 Questions
Exam 43: LPs, LLCs, and LLPs47 Questions
Exam 44: Corporate Formation52 Questions
Exam 46: Securities Regulation56 Questions
Exam 47: Accountants Liability and Malpractice51 Questions
Exam 48: Management of Corporations53 Questions
Exam 49: Real Property53 Questions
Exam 50: Environmental Law and Land Use Controls54 Questions
Exam 51: Leases53 Questions
Exam 52: Decedents Estates and Trusts53 Questions
Select questions type
Under the Due Process Clause, certain rules are traditionally employed to determine jurisdiction under state "long-arm" statutes. These rules are not applicable to businesses that choose to transact on the Internet.
(True/False)
4.9/5
(31)
Cyberlaw is a completely new area of law, unrelated to any established field of law.
(True/False)
4.8/5
(36)
Sam accesses the Internet and secures information (including credit history) on another person. If that information is used to purchase products in the other person's name, Sam's actions constitute:
(Multiple Choice)
4.7/5
(42)
The law of real property is included in those categories of legal issues covered by cyberlaw.
(True/False)
4.8/5
(27)
Bon, located in Florida, desires to enter into a contract with Jon, a resident of Maine. Neither wishes to meet face-to-face, as both are busy with a variety of business interests. Instead, they wish to form a contract over the Internet. Would a contract formed over the Internet be valid?
(Essay)
4.8/5
(40)
The formation of contracts in cyberspace is always governed by the law of the United States.
(True/False)
4.9/5
(34)
The term "cyberspace" describes the World Wide Web and Internet communication.
(True/False)
4.8/5
(36)
Copyright protection is not possible for materials located on the Internet.
(True/False)
4.8/5
(30)
The Digital Millennium Copyright Act makes it a federal offense to circumvent, or create programs to circumvent, encryption devices placed in copyrighted material to prevent unauthorized copying.
(True/False)
5.0/5
(32)
Nonconsensual interception of your e-mail by someone other than your employer is:
(Multiple Choice)
4.8/5
(31)
Roxy is employed as a manager at "com.com," an Internet-based company attempting to compete successfully in the highly competitive software development industry. Roxy is concerned that one of her employees, Randy, is not performing at an acceptable level. While Roxy has noticed that Randy spends considerable time using the computer at his workstation, his productivity is lacking. Roxy suspects Randy is using the company's e-mail system for personal use instead of working on company business. Is Roxy permitted to monitor Randy's email?
(Essay)
4.7/5
(33)
The taking of an image, likeness, or name for purposes of commercial advantage is protected by :
(Multiple Choice)
4.7/5
(39)
__________-sign is a federal law that recognizes digital signatures as authentic for purposes of contract formation.
(Multiple Choice)
4.9/5
(33)
Existing securities laws apply to securities transactions over the Internet.
(True/False)
4.8/5
(33)
The Commerce Clause prohibits state governments from taxing Internet transactions.
(True/False)
5.0/5
(37)
The taking of an image off someone's web site and using it for commercial advantage is called:
(Multiple Choice)
4.8/5
(47)
Employers have access and control rights to their employees' e-mail.
(True/False)
4.8/5
(36)
Showing 21 - 40 of 52
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)