Filters
Question type

Study Flashcards

In an attempt to combat spam, thirty-seven states have enacted laws that prohibit or regulate its use.

A) True
B) False

Correct Answer

verifed

verified

When you download an application on your smartphone, you are typically entering into a license agreement.

A) True
B) False

Correct Answer

verifed

verified

Much of the material on the Internet, including software and database information, is not copyrighted.

A) True
B) False

Correct Answer

verifed

verified

Federal law prevents a provider of communication services-such as a cell phone company-from divulging private communications to certain entities and individuals.

A) True
B) False

Correct Answer

verifed

verified

Federal law permits the intentional interception of any wire, oral, or electronic communication.

A) True
B) False

Correct Answer

verifed

verified

The Anticybersquatting Consumer Protection Act applies to most, but not all, domain name registrations of trademarks.

A) True
B) False

Correct Answer

verifed

verified

"Dawn" is a song included in the sound track of "eDay," a movie produced and distributed by FasTrac Corporation. The song features a digital sampling of a few seconds of the guitar solo of one of George Harrison's copyrighted sound recordings without permission. Does this digital sampling constitute copyright infringement on the part of FasTrac? Explain.

Correct Answer

verifed

verified

Yes, the digital sampling described in t...

View Answer

Criminal liability for the piracy of copyrighted materials extends only to persons who exchanged unauthorized copies for profit.

A) True
B) False

Correct Answer

verifed

verified

Sales & Revenue, Inc., discovers that defamatory statements about its policies and products are being posted in an online forum. TransWeb Inc., the Internet service provider whose users are posting the messages, refuses to disclose the identity of the person or persons responsible. Sales & Revenue files a suit against the anonymous users. The plaintiff can obtain from TransWeb the identity of the persons responsible for the defamatory messages by


A) ​using the authority of the court.
B) ​gaining unauthorized access to TransWeb's servers.
C) ​deceiving TransWeb into revealing the posters' identities.
D) ​no legal or illegal means.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

To test computer security and conduct encryption research, Tech Solutions Inc. circumvents the encryption software and other technological antipiracy protection of United Business Corporation's software. Under the Digital Millennium Copyright Act, this is


A) ​a violation of copyright law.
B) ​prohibited but not a violation of copyright law.
C) ​a "fair use" exception to the provisions of the act.
D) ​permitted for reconsideration every three years.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

A social media post cannot be used to invalidate a settlement agreement.

A) True
B) False

Correct Answer

verifed

verified

An Internet service provider is liable for any act of copyright infringement by its customer.​

A) True
B) False

Correct Answer

verifed

verified

Penalties exist for anyone who circumvents encryption software or other technological antipiracy protection.

A) True
B) False

Correct Answer

verifed

verified

The employees of Eco Engineering Inc. share company-related resources among multiple computers without requiring a central network server. This is


A) ​digital sampling.
B) ​cybersquatting.
C) ​cloud computing.
D) ​peer-to-peer (P2P) networking.

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Social media users can post trademarked images or copyrighted materials without infringing the owners' rights, even if it is done without permission.

A) True
B) False

Correct Answer

verifed

verified

In some states, an unsolicited e-mail must include a toll-free phone number that the recipient can use to ask the sender to send no more unsolicited e-mail.

A) True
B) False

Correct Answer

verifed

verified

Online conduct gives rise to only a narrow variety of legal actions.

A) True
B) False

Correct Answer

verifed

verified

BurgerBoy Restaurant Corporation allows its trademark to be used as part of a domain name for BurgerBoyNY, Inc., an unaffiliated company. BurgerBoyNY does not obtain ownership rights in the mark. This is


A) ​trademark infringement.
B) ​fair use.
C) ​a license.
D) ​trademark dilution.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Web Marketing Inc. buys and sells domain names with the click of a mouse. A domain name can be bought and sold many times. Each change of owner is registered automatically as part of a mass registration. In this environment


A) ​cybersquatting can flourish.
B) ​typosquatting occurs unintentionally through clerical misspellings.
C) ​brands and trademarks are automatically protected from cybersquatters.
D) ​the Federal Trade Commission can sanction Web Marketing.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

The manufacture, import, sale, and distribution of devices or services for the circumvention of encryption software is prohibited.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 72

Related Exams

Show Answer