Exam 29: Computer Privacy and Speech
Exam 1: Our System of Law38 Questions
Exam 2: Ethics and the Law44 Questions
Exam 3: Criminal Law48 Questions
Exam 4: Tort Law48 Questions
Exam 5: Constitutional Law40 Questions
Exam 6: Administrative Law46 Questions
Exam 7: Introduction to Contracts48 Questions
Exam 8: Offer and Acceptance44 Questions
Exam 9: Mutual Agreement44 Questions
Exam 10: Consideration47 Questions
Exam 11: Competent Parties47 Questions
Exam 12: Legal Purpose of Contracts46 Questions
Exam 13: Form of Contracts43 Questions
Exam 14: Operation of Contracts43 Questions
Exam 15: Discharge of Contracts42 Questions
Exam 16: Transfer of Title43 Questions
Exam 17: Sales45 Questions
Exam 18: Warranties43 Questions
Exam 19: Agency43 Questions
Exam 20: Business Organizations43 Questions
Exam 21: Bankruptcy42 Questions
Exam 22: Introduction to Commercial Paper43 Questions
Exam 23: Transfer and Discharge of Commercial Paper43 Questions
Exam 24: Real and Personal Property43 Questions
Exam 25: Bailments43 Questions
Exam 26: Landlord-Tenant Relations42 Questions
Exam 27: Wills, Intestacy, and Trusts43 Questions
Exam 28: Intellectual Property43 Questions
Exam 29: Computer Privacy and Speech43 Questions
Exam 30: Conducting Business in Cyberspace43 Questions
Exam 31: The Employer-Employee Relationship44 Questions
Exam 32: Employment Law44 Questions
Exam 33: Product Liability43 Questions
Exam 34: Professionals Liability43 Questions
Exam 35: International Business Law43 Questions
Exam 36: Business and the Environment43 Questions
Select questions type
Even if an employer promises not to read the employee's e-mail messages,courts in some states have still ruled that the promise does not create a reasonable expectation of privacy.
(True/False)
4.9/5
(37)
A bank employee who programs the bank's computer to make deductions from one or several accounts,and to deposit the funds to an account set up and controlled by the employee,could be prosecuted for ______________even though he or she had not touched actual currency.
(Multiple Choice)
4.7/5
(42)
Unsolicited e-mails sent for commercial purposes are popularly referred to as:
(Multiple Choice)
4.8/5
(35)
Under the ECPA there must be intent to exceed authorization for a crime to be committed; the Computer Fraud and Abuse Act (CFAA)also requires such intent if the intrusion onto another person's computer stored information causes damage.
(True/False)
4.8/5
(29)
In the case of newspapers,the ___________ may not recover damages unless he or she can show that the newspaper acted with actual malice.
(Multiple Choice)
4.7/5
(40)
While there are currently no federal laws prohibiting the use of cookies when gathering information regarding adults,the Children's Online Privacy Protection Act prohibits this practice when minors are involved,unless there is parental consent.
(True/False)
4.8/5
(36)
Under the ECPA,to disclose to a third party the contents of stored computer information that has been obtained without permission is a(n):
(Multiple Choice)
5.0/5
(31)
Federal legislation disallows most,but not all kinds of online:
(Multiple Choice)
4.9/5
(37)
To use any device that is part of an electronic transfer mechanism to steal money,goods,or services or to alter data,interrupt wire transmissions,or use stolen codes or passwords,when the purpose of such activity is to obtain something of value unlawfully,is a federal offense under the:
(Multiple Choice)
4.8/5
(34)
A file that is imbedded on the hard drive of a computer,often without a person's knowledge,that collects and stores information about the user and his or her behavior,including the Web sites that have been visited,is known as a:
(Multiple Choice)
4.9/5
(32)
From a legal standpoint,it is not allowable for a seller to solicit via e-mail.
(True/False)
4.7/5
(43)
The ECPA also grants an Internet service provider (ISP)the right to __________ e-mail messages without the subscriber's consent.
(Multiple Choice)
5.0/5
(42)
Spam is undesirable because it can drain an ISP's resources,strain network bandwidth,and clog a user's e-mail folders.
(True/False)
4.9/5
(39)
When individuals learn that someone has posted an untruth about them,especially when such untruth harms them professionally,they often attempt to hold their ISP liable.
(True/False)
4.9/5
(43)
The rapid advances in technology being experienced today make it difficult for people to maintain online anonymity or distance between themselves and powerful:
(Multiple Choice)
4.8/5
(38)
The process in which a legitimate Web site is reproduced in order to fool users into thinking that they are connected to a trusted site is known as:
(Multiple Choice)
4.8/5
(24)
Identify and describe the three major areas that the Computer Fraud and Abuse Act (CFAA)covers.
(Essay)
4.8/5
(36)
Transferring funds from one bank account to another,changing students' grades in college computer files,and crediting accounts for purchases made are not instances of unauthorized use of computers.
(True/False)
4.8/5
(45)
Bryan,an employee of Anderson Co.,regularly placed orders for raw materials with Sasha,an employee of Kleinman Glass Corporation.Bryan then sent an e-mail to Sasha through his work e-mail account,asking her to go out to dinner with him.Bryan's immediate supervisor at Anderson Co.read the e-mail.What consequences will Bryan have to face for his act?
(Essay)
4.9/5
(35)
Showing 21 - 40 of 43
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)