Exam 29: Computer Privacy and Speech
Exam 1: Our System of Law38 Questions
Exam 2: Ethics and the Law42 Questions
Exam 3: Criminal Law47 Questions
Exam 4: Tort Law48 Questions
Exam 5: Constitutional Law40 Questions
Exam 6: Administrative Law45 Questions
Exam 7: Introduction to Contracts48 Questions
Exam 8: Offer and Acceptance44 Questions
Exam 9: Mutual Agreement44 Questions
Exam 10: Consideration47 Questions
Exam 11: Competent Parties47 Questions
Exam 12: Legal Purpose of Contracts46 Questions
Exam 13: Form of Contracts42 Questions
Exam 14: Operation of Contracts43 Questions
Exam 15: Discharge of Contracts42 Questions
Exam 16: Transfer of Title42 Questions
Exam 17: Sales45 Questions
Exam 18: Warranties43 Questions
Exam 19: Agency42 Questions
Exam 20: Business Organizations42 Questions
Exam 21: Bankruptcy40 Questions
Exam 22: Introduction to Commercial Paper43 Questions
Exam 23: Transfer and Discharge of Commercial Paper43 Questions
Exam 24: Real and Personal Property41 Questions
Exam 25: Bailments43 Questions
Exam 26: Landlord-Tenant Relations42 Questions
Exam 27: Wills, Intestacy, and Trusts43 Questions
Exam 28: Intellectual Property42 Questions
Exam 29: Computer Privacy and Speech43 Questions
Exam 30: Conducting Business in Cyberspace43 Questions
Exam 31: The Employer-Employee Relationship44 Questions
Exam 32: Employment Law44 Questions
Exam 33: Product Liability43 Questions
Exam 34: Professionals Liability43 Questions
Exam 35: International Business Law43 Questions
Exam 36: Business and the Environment43 Questions
Exam 37: Health Care Law43 Questions
Select questions type
Federal criminal statutes are not used to prosecute computer crime.
Free
(True/False)
4.8/5
(30)
Correct Answer:
False
A federal statute passed to regulate Web sites that contain obscene material or child pornography has now been ruled _____ by the courts because it violates due process of law.
Free
(Multiple Choice)
4.7/5
(44)
Correct Answer:
C
Even if a person's intent is good and his or her conduct accidentally causes damage, then he or she may be prosecuted for a federal crime under the:
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
C
To use any device that is part of an electronic transfer mechanism to steal money, goods, or services or to alter data, interrupt wire transmissions, or use stolen codes or passwords, when the purpose of such activity is to obtain something of value unlawfully, is a federal offense under the:
(Multiple Choice)
4.8/5
(37)
The rules of defamation vary depending on whether one is or is not a public figure.
(True/False)
4.9/5
(38)
While there are currently no federal laws prohibiting the use of cookies when gathering information regarding adults, the Children's Online Privacy Protection Act prohibits this practice when minors are involved, unless there is parental consent.
(True/False)
4.7/5
(47)
Instructions hidden in software with the potential to cause significant damage to both hardware and software is a:
(Multiple Choice)
4.8/5
(36)
When individuals learn that someone has posted an untruth about them, especially when such untruth harms them professionally, they often attempt to hold their ISP liable.
(True/False)
4.8/5
(37)
Consumers who believe that their right to privacy is being violated by the embedding of software can complain to the:
(Multiple Choice)
4.8/5
(37)
In the case of newspapers, the ___________ may not recover damages unless he or she can show that the newspaper acted with actual malice.
(Multiple Choice)
4.9/5
(43)
Bryan, an employee of Anderson Co., regularly placed orders for raw materials with Sasha, an employee of Kleinman Glass Corporation. Bryan sent an e-mail to Sasha through his work e-mail account, asking her to go out to dinner with him. Bryan's immediate supervisor at Anderson Co. read the e-mail. What consequences will Bryan have to face for his act?
(Essay)
4.9/5
(26)
Under the ECPA, the individual must act ___ in order to commit a crime.
(Multiple Choice)
4.9/5
(35)
The Computer Fraud and Abuse Act (CFAA) at times limits the ECPA. Under the ECPA there must be an intent to exceed authorization for a crime to be committed, and the CFAA does not require such intent if the intrusion onto another person's computer-stored information causes damage.
(True/False)
4.8/5
(31)
The rapid advances in technology being experienced today make it difficult for people to maintain online anonymity or distance between themselves and powerful:
(Multiple Choice)
4.9/5
(49)
From a legal standpoint, it is not allowable for a seller to solicit via e-mail.
(True/False)
4.8/5
(32)
The ECPA grants an Internet service provider (ISP) the right to __________ e-mail messages without the subscriber's consent.
(Multiple Choice)
4.8/5
(39)
It is a problematic issue as to how offshore gambling can be regulated, where ___________ laws generally do not apply.
(Multiple Choice)
4.7/5
(36)
A person who gains unauthorized access to computers, either for mischief or with criminal intent, is called a(n):
(Multiple Choice)
4.7/5
(40)
A type of computer crime concerns _____ access to computer data.
(Multiple Choice)
4.9/5
(34)
Online marketers of products and services have quickly recognized that learning about consumers' online behavior presents a real opportunity to increase their:
(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 43
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)