Exam 29: Computer Privacy and Speech
Exam 1: Our System of Law38 Questions
Exam 2: Ethics and the Law42 Questions
Exam 3: Criminal Law47 Questions
Exam 4: Tort Law48 Questions
Exam 5: Constitutional Law40 Questions
Exam 6: Administrative Law45 Questions
Exam 7: Introduction to Contracts48 Questions
Exam 8: Offer and Acceptance44 Questions
Exam 9: Mutual Agreement44 Questions
Exam 10: Consideration47 Questions
Exam 11: Competent Parties47 Questions
Exam 12: Legal Purpose of Contracts46 Questions
Exam 13: Form of Contracts42 Questions
Exam 14: Operation of Contracts43 Questions
Exam 15: Discharge of Contracts42 Questions
Exam 16: Transfer of Title42 Questions
Exam 17: Sales45 Questions
Exam 18: Warranties43 Questions
Exam 19: Agency42 Questions
Exam 20: Business Organizations42 Questions
Exam 21: Bankruptcy40 Questions
Exam 22: Introduction to Commercial Paper43 Questions
Exam 23: Transfer and Discharge of Commercial Paper43 Questions
Exam 24: Real and Personal Property41 Questions
Exam 25: Bailments43 Questions
Exam 26: Landlord-Tenant Relations42 Questions
Exam 27: Wills, Intestacy, and Trusts43 Questions
Exam 28: Intellectual Property42 Questions
Exam 29: Computer Privacy and Speech43 Questions
Exam 30: Conducting Business in Cyberspace43 Questions
Exam 31: The Employer-Employee Relationship44 Questions
Exam 32: Employment Law44 Questions
Exam 33: Product Liability43 Questions
Exam 34: Professionals Liability43 Questions
Exam 35: International Business Law43 Questions
Exam 36: Business and the Environment43 Questions
Exam 37: Health Care Law43 Questions
Select questions type
Transferring funds from one bank account to another, changing students' grades in college computer files, and crediting accounts for purchases made are not instances of unauthorized use of computers.
(True/False)
4.8/5
(32)
A file that is imbedded on the hard drive of a computer, often without a person's knowledge, that collects and stores information about the user and his or her behavior, including the Web sites that have been visited, is known as a:
(Multiple Choice)
4.9/5
(32)
A bank employee who programs the bank's computer to make deductions from one or several accounts, and to deposit the funds to an account set up and controlled by the employee, could be prosecuted for ______________even though he or she had not touched actual currency.
(Multiple Choice)
5.0/5
(38)
Spam is undesirable because it can drain an ISP's resources, strain network bandwidth, and clog a user's e-mail folders.
(True/False)
4.9/5
(41)
Federal legislation disallows most, but not all kinds of online:
(Multiple Choice)
4.8/5
(43)
There are _______ distinct rights of privacy generally recognized in the United States.
(Multiple Choice)
4.7/5
(31)
The laws governing online gambling vary from state to state, and most states have pending regulations that would severely restrict how and when such gambling may take place.
(True/False)
4.7/5
(33)
The rules relating to legal purpose and competent parties in contract law do not apply to agreements made in the form of wagers placed online.
(True/False)
4.8/5
(38)
Even if an employer promises not to read the employee's e-mail messages, courts in some states have still ruled that the promise does not create a reasonable expectation of privacy.
(True/False)
4.8/5
(43)
Identify and describe the three major areas that the Computer Fraud and Abuse Act (CFAA) covers.
(Essay)
4.9/5
(39)
The process in which a legitimate Web site is reproduced in order to fool users into thinking that they are connected to a trusted site is known as:
(Multiple Choice)
4.8/5
(37)
Many experts argue that the problem with the legal definition of __________ is that it is too vague and ambiguous.
(Multiple Choice)
4.9/5
(39)
The Electronic Communications Privacy Act (ECPA) states that individuals may not gain access to a(n) _____without permission.
(Multiple Choice)
4.9/5
(30)
It is not a crime under the ECPA to disclose to a third party the contents of stored computer information that has been obtained without permission.
(True/False)
4.8/5
(42)
When a person sustains severe anxiety, the injured party may sue the offending party for:
(Multiple Choice)
4.9/5
(39)
Unsolicited e-mails sent for commercial purposes are popularly referred to as:
(Multiple Choice)
4.8/5
(39)
Do Internet Service Providers have the legal right to monitor their subscribers' e-mail without consent, and what steps do these ISPs take to protect themselves in this process?
(Essay)
4.8/5
(44)
Showing 21 - 40 of 43
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)