Exam 11: Cyberlaw
Exam 1: The Nature and Sources of Law60 Questions
Exam 2: The Court System and Dispute Resolution57 Questions
Exam 3: Business Ethics, social Forces, and the Law52 Questions
Exam 4: The Constitution As the Foundation of the Legal Environment59 Questions
Exam 5: Government Regulation of Competition and Prices47 Questions
Exam 6: Administrative Agencies58 Questions
Exam 7: The Legal Environment of International Trade57 Questions
Exam 8: Crimes60 Questions
Exam 9: Torts58 Questions
Exam 10: Intellectual Property Rights52 Questions
Exam 11: Cyberlaw42 Questions
Exam 12: Nature and Classes of Contracts: Contracting on the Internet53 Questions
Exam 13: Formation of Contracts: Offer and Acceptance53 Questions
Exam 14: Capacity and Genuine Assent44 Questions
Exam 15: Consideration49 Questions
Exam 16: Legality and Public Policy49 Questions
Exam 17: Writing, electronic Forms, and Interpretation of Contracts60 Questions
Exam 18: Third Persons and Contracts51 Questions
Exam 19: Discharge of Contracts57 Questions
Exam 20: Breach of Contract and Remedies58 Questions
Exam 21: Personal Property and Bailments53 Questions
Exam 22: Legal Aspects of Supply Chain Management53 Questions
Exam 23: Nature and Form of Sales53 Questions
Exam 24: Title and Risk of Loss45 Questions
Exam 25: Product Liability: Warranties and Torts54 Questions
Exam 26: Obligations and Performance43 Questions
Exam 27: Remedies for Breach of Sales Contracts53 Questions
Exam 28: Kinds of Instruments, parties, and Negotiability52 Questions
Exam 29: Transfers of Negotiable Instruments and Warranties of Parties55 Questions
Exam 30: Liability of the Parties Under Negotiable Instruments53 Questions
Exam 31: Checks and Funds Transfers53 Questions
Exam 32: Nature of the Debtor-Creditor Relationship53 Questions
Exam 33: Consumer Protection53 Questions
Exam 34: Secured Transactions in Personal Property53 Questions
Exam 35: Bankruptcy53 Questions
Exam 36: Insurance53 Questions
Exam 37: Agency53 Questions
Exam 38: Third Persons in Agency53 Questions
Exam 39: Regulation of Employment53 Questions
Exam 40: Equal Employment Opportunity Law53 Questions
Exam 41: Types of Business Organizations53 Questions
Exam 42: Partnerships53 Questions
Exam 43: LPs, LLCs, and LLPs52 Questions
Exam 44: Corporate Formation52 Questions
Exam 46: Securities Regulation53 Questions
Exam 47: Accountants Liability and Malpractice53 Questions
Exam 48: Management of Corporations53 Questions
Exam 49: Real Property53 Questions
Exam 50: Environmental Law and Land Use Controls53 Questions
Exam 51: Leases53 Questions
Exam 52: Decedents Estates and Trusts53 Questions
Select questions type
Employers have access and control rights to their employees' e-mail.
(True/False)
4.8/5
(32)
__________ is a federal law that recognizes digital signatures as authentic for purposes of contract formation.
(Multiple Choice)
4.8/5
(41)
The formation of contracts in cyberspace is governed today largely by:
(Multiple Choice)
4.8/5
(44)
The key to being able to have Internet Service Providers (ISPs)release identities of those who post statements on the Internet is whether the posters were engaged in illegal or harmful activities.
(True/False)
5.0/5
(35)
Web site operators are free to plant "cookies" on computers with no fear of action for breach of unauthorized access or privacy.
(True/False)
5.0/5
(35)
When employers allow employees to reimburse the employer for private use of text services,employer monitoring and disclosure of those texts is:
(Multiple Choice)
4.9/5
(36)
Cleaning up your name on Google using one of several services is a good way to eliminate any suspicions perspective or current employers may have about you.
(True/False)
4.8/5
(36)
Roxy is employed as a manager at "com.com," an Internet-based company attempting to compete successfully in the highly competitive software development industry.Roxy is concerned that one of her employees,Randy,is not performing at an acceptable level.While Roxy has noticed that Randy spends considerable time using the computer at his workstation,his productivity is lacking.Roxy suspects Randy is using the company's e-mail system for personal use instead of working on company business.Is Roxy permitted to monitor Randy's email?
(Essay)
4.7/5
(48)
Employers are required to give notice to employees that they will monitor their employees' e-mail.
(True/False)
4.8/5
(37)
The majority of fraud complaints received by the FBI relate to:
(Multiple Choice)
4.8/5
(35)
The Federal Trade Commission (FTC)has begun to take positions on Internet issues that are:
(Multiple Choice)
4.9/5
(35)
Federal law now recognizes the validity of electronic signatures.
(True/False)
4.8/5
(30)
The term "cyberlaw" refers to laws and precedent applicable to Internet transactions and communications.
(True/False)
4.7/5
(36)
It is a crime to post nasty opinions about someone in an Internet chat room.
(True/False)
4.8/5
(39)
The tort of invasion of privacy has some application to cyberspace communication.
(True/False)
4.8/5
(42)
Sock-puppeting is anonymous blogging that flatters the blogger's company and bashes one or more competitors.
(True/False)
4.8/5
(31)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)