Deck 17: E-Commerce and Digital Law

Full screen (f)
exit full mode
Question
The UCITA provides rules for contracts involving computer information transactions and software and information licenses.
Use Space or
up arrow
down arrow
to flip the card.
Question
A licensor is a party who is granted limited rights in intellectual property or informational rights owned by another person or company.
Question
An e-license is a contract whereby the owner of software grants limited rights to the owner of a computer or digital device to use the software.
Question
ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
Question
A Web contract is enforceable only if it meets the requirements of a traditional contract.
Question
A license is a contract that transfers complete rights in intellectual property and informational rights.
Question
According to the Communications Decency Act,Internet service providers (ISPs)are not liable for the content transmitted over their networks by e-mail users and websites.
Question
E-mail contracts are enforceable even if they don't meet traditional contract requirements.
Question
Data and software do not constitute intellectual property.
Question
The CAN-SPAM Act does not regulate spam sent to Americans from other countries.
Question
The CAN-SPAM Act does not can spam but instead approves businesses to use spam as long as they do not lie.
Question
Counteroffers are not effective against electronic agents.
Question
E-mail contracts do not meet the requirements of the Statute of Frauds.
Question
The UCITA does not become law until a state's legislature enacts it as a state statute.
Question
The World Wide Web consists of computers that support a standard set of rules for the exchange of information,called Hypertext Transfer Protocol.
Question
Each website has a unique online address.
Question
The term ISP refers to users who disguise computer viruses as executable programs and send them across the Internet.
Question
The E-SIGN Act is a not a federal statute and state legislatures are required to adopt it in order for it to become state law.
Question
An exclusive license means that for the specified duration of the license,the licensor will not grant rights in the same information to any other person.
Question
ISPs provide e-mail accounts to users,Internet access,and storage on the Internet.
Question
Breach of contract by one party to a licensing agreement gives the nonbreaching party the right to recover damages.
Question
Which of the following is an example of Web-browsing software?

A)Microsoft Internet Explorer
B)Adobe Acrobat Reader
C)Outlook Express
D)BitTorrent
Question
The parties to a contract for the licensing of information owe a duty to perform the obligations stated in the contract.
Question
A "Whois" database maintained by the InterNIC contains all the domain names that have been registered.
Question
.bz is a restricted domain extension and can only be used by businesses or organizations in Brazil.
Question
If Jim purchases an online license for a computer game,he becomes an e-licensor.
Question
Which of the following acts regulates spam e-mail on the Internet?

A)Anticybersquatting Consumer Protection Act
B)Controlling the Assault of Non-Solicited Pornography and Marketing Act
C)Communications Decency Act
D)Uniform Computer Information Transactions Act
Question
The ACPA is federal statute that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.
Question
Which of the following is true of the World Wide Web?

A)Only businesses-not individuals-can have their own websites.
B)Individuals need not register with a service provider to access the web.
C)A website can have several online addresses.
D)Each website must have a unique online address.
Question
The ECPA provides that stored electronic communications may not be accessed by the party or entity providing the electronic communication service.
Question
Registering a domain name of another party's trademarked name or famous person's name in bad faith is called cybersquatting.
Question
A network extension is a unique name that identifies an individual's or company's website.
Question
Which of the following statements is true of e-mail contracts?

A)All e-mail contracts require consideration,capacity and lawful object.
B)E-mail contracts are exempted from the requirements of the Statute of Frauds.
C)E-mail contracts are enforceable even if they don't meet the requirements of a traditional contract.
D)Several e-mails cannot be integrated to determine the parties' agreement.
Question
The.pro domain name extension is available to professionals,such as doctors,lawyers,and consultants.
Question
The ECPA is a federal statute that makes it a crime to intercept an electronic communication at the point of transmission,while in transit,when stored by a router or server,or after receipt by the intended recipient.
Question
The.org domain name extension represents a U.S.website.
Question
The.biz extension is used for large-business and corporate websites.
Question
The UCITA makes it illegal to access another person's stored e-mail.
Question
The computers that constitute the World Wide Web use a standard set of rules known as ________ for the exchange of information.

A)POP
B)POP3
C)HTTP
D)IMAP
Question
The Anticybersquatting Consumer Protection Act is a federal statute that makes online impersonation of another person,misrepresentation of another person,business or organization using inappropriate words,imagery or other media illegal.
Question
What does the Communications Decency Act of 1996 provide?

A)Businesses can send spam e-mails,as long as they don't lie.
B)ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
C)Businesses are liable for invading the right to privacy if they send unsolicited e-mails.
D)The number of servers an ISP can access in a geographical location is limited.
Question
________ are companies that provide consumers and businesses with access to the Internet.

A)ISPs
B)BPOs
C)DSLs
D)IPOs
Question
An exclusive license is defined as ________.

A)a license that grants access to exclusive information for a limited period
B)a license that restricts the licensee to some information only
C)a license that is granted to only one party for a specific period
D)a license that grants licensees only a few rights in intellectual property
Question
Which of the following is true of the UCITA?

A)It establishes a uniform set of rules that prohibit all forms of cybersquatting.
B)It defines which technologies should be used to create a legally binding signature in cyberspace.
C)It aims at eliminating all domain names registered in bad faith.
D)It governs the creation,performance,and enforcement for computer information transactions.
Question
What does the E-SIGN Act provide?

A)Electronically signed contracts cannot be denied effect because they are in electronic form.
B)Electronic records can be sent to consumers who make a purchase,without their specific consent to receiving the record.
C)It defines which technologies should be used to create a legally binding signature in cyberspace.
D)Only smart card verification creates a legally binding signature in cyberspace.
Question
Barney wants to rent an apartment and posts an advertisement in a classifieds website.Two days later,Michael,who wants to rent out his apartment,e-mails Barney and they finalize the deal over the Internet.Barney pays Michael through an online transfer.This is an example of ________.

A)e-licensing
B)e-commerce
C)cybersquatting
D)spamming
Question
A(n)________ is any computer system that has been established by a seller to accept orders.

A)electronic agent
B)top-level extension
C)cybersquatter
D)licensor
Question
LetsConnect is a three-month-old Internet service provider in the U.S.A.In the last two months,it was discovered that several LetsConnect users exchanged online material that is illegal in the United States.The ISP took no measures to investigate the matter or prevent it.Which of the following holds true in this case?

A)The users of LetsConnect are not liable for the material they exchanged.
B)The ISP is not liable for the content transmitted over its network.
C)The ISP will be prosecuted for abusing the freedom of speech.
D)The ISP will be prosecuted for violating the Communications Decency Act.
Question
The ________ recognizes electronic contracts as meeting the writing requirement of the Statute of Frauds for most contracts.

A)Uniform Commercial Code
B)Uniform Computer Information Transactions Act
C)E-SIGN Act
D)Communications Decency Act
Question
Which of the following is true of e-commerce?

A)Lessors cannot use web addresses to lease goods.
B)Intellectual property cannot be explicitly listed for sale on a website.
C)A Web contract is not binding,as opposed to an e-mail contract,which is.
D)A Web contract is not valid if it does not fulfill all the elements of a traditional contract.
Question
Which of the following is true of licenses?

A)A license grants the licensee complete control over intellectual property.
B)An exclusive license is granted to only one licensee for a specific period.
C)A licensee has complete control over the information he or she is allowed to access.
D)A licensee has the right to use information rights beyond the licensor's control.
Question
Under the E-SIGN Act,an e-signature can be verified by using ________.

A)a smart card
B)a domain name
C)HTTP
D)an ISP
Question
Jessica wants to buy a laptop from the Tenn Computers website.Before confirming the purchase,the website asks her to provide biometric identification using an electronic scanner.This is an example of ________.

A)e-licensing
B)an e-signature
C)an exclusive license
D)cybersquatting
Question
Which of the following is true of the CAN-SPAM Act?

A)It regards spam e-mail as a punishable offence.
B)It prohibits spammers from sending sexually-explicit e-mail.
C)It approves businesses to use spam as long as they do not lie.
D)It provides a civil right of action to individuals who have received unsolicited spam.
Question
The CAN-SPAM Act ________.

A)regulates spam sent internationally to Americans from other countries
B)provides a civil right of action to individuals who have received unsolicited spam
C)prohibits the messages themselves from containing graphic sexually explicit material.
D)prohibits businesses from using spam to further their commercial interests.
Question
A(n)________ refers to a contract that transfers limited rights in intellectual property and informational rights.

A)lien
B)tender
C)license
D)trademark
Question
Which of the following is an example of an e-signature?

A)using a credit card at the supermarket to pay for groceries
B)using a debit card to fill gas as the local gas station
C)ordering Chinese food over the phone and paying with a credit card
D)paying the electric bill online using a smart card
Question
A(n)________ refers to a party who is granted limited rights in or access to intellectual property or informational rights owned by another party.

A)lessor
B)lessee
C)licensee
D)licensor
Question
The ________ establishes a uniform and comprehensive set of rules that govern the creation,performance,and enforcement for computer information transactions.

A)CAN-SPAM Act
B)UCITA
C)ECPA
D)ACPA
Question
A(n)________ is an owner of intellectual property or informational rights who transfers rights in the property or information to another party.

A)lessor
B)lessee
C)licensee
D)licensor
Question
Joan reads e-mails from Harold's personal e-mail folder.Which statute has Joan violated and why? Under what circumstances is she permitted to read Harold's e-mail?
Question
If Alice-Bob's daughter-reads e-mails stored in Bob's personal e-mail folder,she has violated the ________ and is liable for prosecution.

A)UCITA
B)ACPA
C)ECPA
D)ICANN
Question
How does an electronic agent react to a counteroffer? Explain with an illustration.
Question
________ is the most widely used domain extension in the world,and is preferred by businesses.

A))net
B))com
C))biz
D))org
Question
While downloading a license to a software program,Harriet reads the Terms of Agreement document which states that the company is not liable for any unforeseen damages that arise from the software.Harriet clicks on "Accept" and continues to install the program.The document is an example of a(n)________.

A)digital signature
B)digital identification
C)licensing agreement
D)implicit contract
Question
What is cybersquatting? Can trademark owners recover domain names registered in bad faith?
Question
The ________ is a federal statute that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.

A)UCITA
B)ACPA
C)ICANN
D)ECPA
Question
A(n)________ uniquely identifies an individual's or company's website.

A)e-signature
B)digital footprint
C)e-mail address
D)domain name
Question
A(n)________ is a contract by which the owner of software or a digital application grants limited rights to the owner of a computer or digital device to use the software or digital application for a limited period and under specified conditions.

A)e-license
B)ISPS
C)domain
D)digital signature
Question
Jonathan Smith,a neurosurgeon in Oregon,wants to start a website that makes it possible for neurosurgeons across the world to work on cases in collaboration.Which of the following domain extensions is most apt for Smith's website?

A))com
B))coop
C))biz
D))pro
Question
The ________ is a federal statute that makes it a crime to intercept an electronic communication at the point of transmission,while in transit,when stored by a router or server,or after receipt by intended recipient.

A)UCITA
B)ECPA
C)ACPA
D)ICANN
Question
The ECPA is a federal statute that ________.

A)establishes that businesses are allowed send spam e-mails,as long as they do not lie
B)rules that ISPs are not liable for the content transmitted over their networks by e-mail users and websites
C)establishes that an e-signature is as effective as a pen-and-paper signature
D)makes it a crime to intercept an electronic communication at the point of transmission
Question
Which of the following can access Henry's stored electronic communications without violating the ECPA?

A)Henry's colleague at work,who is working on the same project as Henry and needs the information
B)Henry's wife,who suspects him of cheating on her
C)Henry's boss,who suspects him of leaking confidential information
D)Henry's personal finance advisor,who wants to see if he has sufficient funds to make an investment
Question
Which of the following domain extensions signifies a resource website,and is an unrestricted global name that may be used by businesses,individuals,and organizations?

A))name
B))coop
C))mobi
D))info
Question
Briefly explain the working of an e-license.
Question
Which of the following entities does the ECPA permit to access stored electronic communication?

A)law enforcement entities performing an investigation
B)the owner of the website where the user has an e-mail account
C)the Internet service provider
D)the bank where an account holder keeps his finances
Question
Which of the following top-level domain name extensions is most commonly used by ISPs,Web-hosting companies,and other businesses that are directly involved in the infrastructure of the Internet?

A))net
B))com
C))biz
D))org
Question
What measures has Congress taken to regulate spam e-mail?
Question
The ________ issued new rules that permit a party to register a domain name with personalized TLD suffixes.

A)UCITA
B)ACPA
C)ICANN
D)ECPA
Question
A(n)________ is a detailed and comprehensive written agreement between a licensor and a licensee that sets forth the express terms of their agreement.

A)digital signature
B)electronic agent
C)license agreement
D)electronic signature
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 17: E-Commerce and Digital Law
1
The UCITA provides rules for contracts involving computer information transactions and software and information licenses.
True
2
A licensor is a party who is granted limited rights in intellectual property or informational rights owned by another person or company.
False
3
An e-license is a contract whereby the owner of software grants limited rights to the owner of a computer or digital device to use the software.
True
4
ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
A Web contract is enforceable only if it meets the requirements of a traditional contract.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
A license is a contract that transfers complete rights in intellectual property and informational rights.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
According to the Communications Decency Act,Internet service providers (ISPs)are not liable for the content transmitted over their networks by e-mail users and websites.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
E-mail contracts are enforceable even if they don't meet traditional contract requirements.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
Data and software do not constitute intellectual property.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
The CAN-SPAM Act does not regulate spam sent to Americans from other countries.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
The CAN-SPAM Act does not can spam but instead approves businesses to use spam as long as they do not lie.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
Counteroffers are not effective against electronic agents.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
E-mail contracts do not meet the requirements of the Statute of Frauds.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
The UCITA does not become law until a state's legislature enacts it as a state statute.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
The World Wide Web consists of computers that support a standard set of rules for the exchange of information,called Hypertext Transfer Protocol.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
Each website has a unique online address.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
The term ISP refers to users who disguise computer viruses as executable programs and send them across the Internet.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
The E-SIGN Act is a not a federal statute and state legislatures are required to adopt it in order for it to become state law.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
An exclusive license means that for the specified duration of the license,the licensor will not grant rights in the same information to any other person.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
ISPs provide e-mail accounts to users,Internet access,and storage on the Internet.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
Breach of contract by one party to a licensing agreement gives the nonbreaching party the right to recover damages.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is an example of Web-browsing software?

A)Microsoft Internet Explorer
B)Adobe Acrobat Reader
C)Outlook Express
D)BitTorrent
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
The parties to a contract for the licensing of information owe a duty to perform the obligations stated in the contract.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
A "Whois" database maintained by the InterNIC contains all the domain names that have been registered.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
.bz is a restricted domain extension and can only be used by businesses or organizations in Brazil.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
If Jim purchases an online license for a computer game,he becomes an e-licensor.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following acts regulates spam e-mail on the Internet?

A)Anticybersquatting Consumer Protection Act
B)Controlling the Assault of Non-Solicited Pornography and Marketing Act
C)Communications Decency Act
D)Uniform Computer Information Transactions Act
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
The ACPA is federal statute that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following is true of the World Wide Web?

A)Only businesses-not individuals-can have their own websites.
B)Individuals need not register with a service provider to access the web.
C)A website can have several online addresses.
D)Each website must have a unique online address.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
The ECPA provides that stored electronic communications may not be accessed by the party or entity providing the electronic communication service.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
Registering a domain name of another party's trademarked name or famous person's name in bad faith is called cybersquatting.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
A network extension is a unique name that identifies an individual's or company's website.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following statements is true of e-mail contracts?

A)All e-mail contracts require consideration,capacity and lawful object.
B)E-mail contracts are exempted from the requirements of the Statute of Frauds.
C)E-mail contracts are enforceable even if they don't meet the requirements of a traditional contract.
D)Several e-mails cannot be integrated to determine the parties' agreement.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
The.pro domain name extension is available to professionals,such as doctors,lawyers,and consultants.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
The ECPA is a federal statute that makes it a crime to intercept an electronic communication at the point of transmission,while in transit,when stored by a router or server,or after receipt by the intended recipient.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
The.org domain name extension represents a U.S.website.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
The.biz extension is used for large-business and corporate websites.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
The UCITA makes it illegal to access another person's stored e-mail.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
The computers that constitute the World Wide Web use a standard set of rules known as ________ for the exchange of information.

A)POP
B)POP3
C)HTTP
D)IMAP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
The Anticybersquatting Consumer Protection Act is a federal statute that makes online impersonation of another person,misrepresentation of another person,business or organization using inappropriate words,imagery or other media illegal.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
What does the Communications Decency Act of 1996 provide?

A)Businesses can send spam e-mails,as long as they don't lie.
B)ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
C)Businesses are liable for invading the right to privacy if they send unsolicited e-mails.
D)The number of servers an ISP can access in a geographical location is limited.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
________ are companies that provide consumers and businesses with access to the Internet.

A)ISPs
B)BPOs
C)DSLs
D)IPOs
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
An exclusive license is defined as ________.

A)a license that grants access to exclusive information for a limited period
B)a license that restricts the licensee to some information only
C)a license that is granted to only one party for a specific period
D)a license that grants licensees only a few rights in intellectual property
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following is true of the UCITA?

A)It establishes a uniform set of rules that prohibit all forms of cybersquatting.
B)It defines which technologies should be used to create a legally binding signature in cyberspace.
C)It aims at eliminating all domain names registered in bad faith.
D)It governs the creation,performance,and enforcement for computer information transactions.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
What does the E-SIGN Act provide?

A)Electronically signed contracts cannot be denied effect because they are in electronic form.
B)Electronic records can be sent to consumers who make a purchase,without their specific consent to receiving the record.
C)It defines which technologies should be used to create a legally binding signature in cyberspace.
D)Only smart card verification creates a legally binding signature in cyberspace.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
Barney wants to rent an apartment and posts an advertisement in a classifieds website.Two days later,Michael,who wants to rent out his apartment,e-mails Barney and they finalize the deal over the Internet.Barney pays Michael through an online transfer.This is an example of ________.

A)e-licensing
B)e-commerce
C)cybersquatting
D)spamming
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
A(n)________ is any computer system that has been established by a seller to accept orders.

A)electronic agent
B)top-level extension
C)cybersquatter
D)licensor
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
LetsConnect is a three-month-old Internet service provider in the U.S.A.In the last two months,it was discovered that several LetsConnect users exchanged online material that is illegal in the United States.The ISP took no measures to investigate the matter or prevent it.Which of the following holds true in this case?

A)The users of LetsConnect are not liable for the material they exchanged.
B)The ISP is not liable for the content transmitted over its network.
C)The ISP will be prosecuted for abusing the freedom of speech.
D)The ISP will be prosecuted for violating the Communications Decency Act.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
The ________ recognizes electronic contracts as meeting the writing requirement of the Statute of Frauds for most contracts.

A)Uniform Commercial Code
B)Uniform Computer Information Transactions Act
C)E-SIGN Act
D)Communications Decency Act
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following is true of e-commerce?

A)Lessors cannot use web addresses to lease goods.
B)Intellectual property cannot be explicitly listed for sale on a website.
C)A Web contract is not binding,as opposed to an e-mail contract,which is.
D)A Web contract is not valid if it does not fulfill all the elements of a traditional contract.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is true of licenses?

A)A license grants the licensee complete control over intellectual property.
B)An exclusive license is granted to only one licensee for a specific period.
C)A licensee has complete control over the information he or she is allowed to access.
D)A licensee has the right to use information rights beyond the licensor's control.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
Under the E-SIGN Act,an e-signature can be verified by using ________.

A)a smart card
B)a domain name
C)HTTP
D)an ISP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
Jessica wants to buy a laptop from the Tenn Computers website.Before confirming the purchase,the website asks her to provide biometric identification using an electronic scanner.This is an example of ________.

A)e-licensing
B)an e-signature
C)an exclusive license
D)cybersquatting
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is true of the CAN-SPAM Act?

A)It regards spam e-mail as a punishable offence.
B)It prohibits spammers from sending sexually-explicit e-mail.
C)It approves businesses to use spam as long as they do not lie.
D)It provides a civil right of action to individuals who have received unsolicited spam.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
The CAN-SPAM Act ________.

A)regulates spam sent internationally to Americans from other countries
B)provides a civil right of action to individuals who have received unsolicited spam
C)prohibits the messages themselves from containing graphic sexually explicit material.
D)prohibits businesses from using spam to further their commercial interests.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
A(n)________ refers to a contract that transfers limited rights in intellectual property and informational rights.

A)lien
B)tender
C)license
D)trademark
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is an example of an e-signature?

A)using a credit card at the supermarket to pay for groceries
B)using a debit card to fill gas as the local gas station
C)ordering Chinese food over the phone and paying with a credit card
D)paying the electric bill online using a smart card
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
A(n)________ refers to a party who is granted limited rights in or access to intellectual property or informational rights owned by another party.

A)lessor
B)lessee
C)licensee
D)licensor
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
The ________ establishes a uniform and comprehensive set of rules that govern the creation,performance,and enforcement for computer information transactions.

A)CAN-SPAM Act
B)UCITA
C)ECPA
D)ACPA
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
A(n)________ is an owner of intellectual property or informational rights who transfers rights in the property or information to another party.

A)lessor
B)lessee
C)licensee
D)licensor
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
Joan reads e-mails from Harold's personal e-mail folder.Which statute has Joan violated and why? Under what circumstances is she permitted to read Harold's e-mail?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
If Alice-Bob's daughter-reads e-mails stored in Bob's personal e-mail folder,she has violated the ________ and is liable for prosecution.

A)UCITA
B)ACPA
C)ECPA
D)ICANN
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
How does an electronic agent react to a counteroffer? Explain with an illustration.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
________ is the most widely used domain extension in the world,and is preferred by businesses.

A))net
B))com
C))biz
D))org
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
While downloading a license to a software program,Harriet reads the Terms of Agreement document which states that the company is not liable for any unforeseen damages that arise from the software.Harriet clicks on "Accept" and continues to install the program.The document is an example of a(n)________.

A)digital signature
B)digital identification
C)licensing agreement
D)implicit contract
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
What is cybersquatting? Can trademark owners recover domain names registered in bad faith?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
The ________ is a federal statute that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.

A)UCITA
B)ACPA
C)ICANN
D)ECPA
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
A(n)________ uniquely identifies an individual's or company's website.

A)e-signature
B)digital footprint
C)e-mail address
D)domain name
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
A(n)________ is a contract by which the owner of software or a digital application grants limited rights to the owner of a computer or digital device to use the software or digital application for a limited period and under specified conditions.

A)e-license
B)ISPS
C)domain
D)digital signature
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
Jonathan Smith,a neurosurgeon in Oregon,wants to start a website that makes it possible for neurosurgeons across the world to work on cases in collaboration.Which of the following domain extensions is most apt for Smith's website?

A))com
B))coop
C))biz
D))pro
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
The ________ is a federal statute that makes it a crime to intercept an electronic communication at the point of transmission,while in transit,when stored by a router or server,or after receipt by intended recipient.

A)UCITA
B)ECPA
C)ACPA
D)ICANN
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
The ECPA is a federal statute that ________.

A)establishes that businesses are allowed send spam e-mails,as long as they do not lie
B)rules that ISPs are not liable for the content transmitted over their networks by e-mail users and websites
C)establishes that an e-signature is as effective as a pen-and-paper signature
D)makes it a crime to intercept an electronic communication at the point of transmission
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following can access Henry's stored electronic communications without violating the ECPA?

A)Henry's colleague at work,who is working on the same project as Henry and needs the information
B)Henry's wife,who suspects him of cheating on her
C)Henry's boss,who suspects him of leaking confidential information
D)Henry's personal finance advisor,who wants to see if he has sufficient funds to make an investment
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following domain extensions signifies a resource website,and is an unrestricted global name that may be used by businesses,individuals,and organizations?

A))name
B))coop
C))mobi
D))info
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
Briefly explain the working of an e-license.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following entities does the ECPA permit to access stored electronic communication?

A)law enforcement entities performing an investigation
B)the owner of the website where the user has an e-mail account
C)the Internet service provider
D)the bank where an account holder keeps his finances
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following top-level domain name extensions is most commonly used by ISPs,Web-hosting companies,and other businesses that are directly involved in the infrastructure of the Internet?

A))net
B))com
C))biz
D))org
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
What measures has Congress taken to regulate spam e-mail?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
The ________ issued new rules that permit a party to register a domain name with personalized TLD suffixes.

A)UCITA
B)ACPA
C)ICANN
D)ECPA
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
A(n)________ is a detailed and comprehensive written agreement between a licensor and a licensee that sets forth the express terms of their agreement.

A)digital signature
B)electronic agent
C)license agreement
D)electronic signature
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.