Exam 29: Computer Privacy and Speech

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The rules relating to legal purpose and competent parties in contract law do not apply to agreements made in the form of wagers placed online.

Free
(True/False)
4.8/5
(43)
Correct Answer:
Verified

False

Sometimes pictures that are contained on Web sites are alleged to be defamatory.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

False

Many computer crimes,particularly those in which the computer is used as a means of engaging in criminal activity,are simply technologically advanced versions of:

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

C

Defamatory statements would include slander but not libel.

(True/False)
4.9/5
(40)

Federal criminal statutes are not used to prosecute computer crime.

(True/False)
4.8/5
(40)

Federal and state laws make most forms of gambling:

(Multiple Choice)
4.9/5
(33)

The laws governing online gambling vary from state to state,and most states have pending regulations that would severely restrict how and when such gambling may take place.

(True/False)
4.8/5
(40)

A federal statute passed to regulate Web sites that contain obscene material or child pornography has now been ruled by the courts to violate due process of law to be:

(Multiple Choice)
5.0/5
(34)

Even if a person's intent is good and his or her conduct accidentally causes damage,then he or she may be prosecuted for a federal crime under the:

(Multiple Choice)
4.9/5
(30)

There are _______ distinct rights of privacy generally recognized in the United States.

(Multiple Choice)
4.8/5
(36)

The rules of defamation vary depending on whether one is or is not a public figure.

(True/False)
4.8/5
(39)

Consumers who believe that their right to privacy is being violated by the embedding of software can complain to the:

(Multiple Choice)
4.8/5
(33)

Online marketers of products and services have quickly recognized that learning about consumers' online behavior presents a real opportunity to increase their:

(Multiple Choice)
4.9/5
(28)

The Electronic Communications Privacy Act (ECPA)states that individuals may not gain access without permission to a(n):

(Multiple Choice)
4.8/5
(35)

Unauthorized access to computers invites violation of:

(Multiple Choice)
5.0/5
(44)

It is a problematic issue as to how offshore gambling can be regulated,where ___________ laws generally do not apply.

(Multiple Choice)
4.8/5
(38)

Do Internet Service Providers have the legal right to monitor their subscribers' e-mail without consent,and what steps do these ISPs take to protect themselves in this process?

(Essay)
4.8/5
(31)

When a person sustains severe anxiety,the injured party may sue the offending party for causing:

(Multiple Choice)
4.8/5
(36)

Many experts argue that the problem with the legal definition of __________ is that it is too vague and ambiguous.

(Multiple Choice)
4.8/5
(46)

A person who gains unauthorized access to computers,either for mischief or with criminal intent,is called a(n):

(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 43
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)