Filters
Question type

Study Flashcards

An Internet service provider is liable for any act of copyright infringement by its customer.​

Correct Answer

verifed

verified

Riley obtains permission from Saga Company to use the firm's game app on Riley's smartphone, tablet, and other mobile device. But Riley does not obtain ownership rights in the app. This is


A) ​a license.
B) ​a cookie.
C) ​cloud computing.
D) ​a violation of the law.

Correct Answer

verifed

verified

To maintain a suit for the invasion of privacy, a person must have a reasonable expectation of privacy in the particular situation.

Correct Answer

verifed

verified

Fact Pattern 14-2 CallTalk Corporation, a smartphone and phone-time seller, chooses to use and register "calltalk" as its domain name. Later, CallTalk's less successful competitor, CellTalk Company, chooses to use and register "caltalk" (an intentional misspelling of "calltalk") as its domain name. Still later, Call&Talk, Inc., uses the domain name "callltalk" (also a deliberate misspelling of "calltalk") without CallTalk's authorization, to sell pornographic phone conversations. -Refer to Fact Pattern 14-2. By using a domain name similar to CallTalk's, CellTalk is most likely


A) ​diminishing the quality of CallTalk's mark.
B) ​making a fair use of CallTalk's mark.
C) ​licensing the use of CallTalk's mark to itself.
D) ​engaging in smart competitive conduct.

Correct Answer

verifed

verified

Downloading music into a computer's random access memory, or RAM, is not copyright infringement, even if it is done without authorization.

Correct Answer

verifed

verified

Far & Wide Corporation uses the trademark of Google Inc. in a meta tag without Google's permission. This is


A) ​cybersquatting.
B) ​typosquatting.
C) ​trademark infringement.
D) ​trademark dilution.

Correct Answer

verifed

verified

Jason transfers select copyrighted music recordings, without the copyright owners' authorization, through his computer and phone to his friends. Jason does not charge his friends for his "service." This is


A) ​copyright infringement.
B) ​a license.
C) ​goodwill.
D) ​"fair use."

Correct Answer

verifed

verified

Grain Mill Company brings a suit against Milled Grain Company under the Anticybersquatting Consumer Protection Act, alleging that Milled Grain is profiting from a domain name that is confusingly similar to Grain Mill's trademark. If Grain Mill is successful, a recovery may include


A) ​actual damages and profits in any amount.
B) ​statutory damages no greater than $1,000.
C) ​statutory damages no less than $100,000..
D) ​all of the choices.

Correct Answer

verifed

verified

Federal law permits the intentional interception of any wire, oral, or electronic communication.

Correct Answer

verifed

verified

Fact Pattern 14-2 CallTalk Corporation, a smartphone and phone-time seller, chooses to use and register "calltalk" as its domain name. Later, CallTalk's less successful competitor, CellTalk Company, chooses to use and register "caltalk" (an intentional misspelling of "calltalk") as its domain name. Still later, Call&Talk, Inc., uses the domain name "callltalk" (also a deliberate misspelling of "calltalk") without CallTalk's authorization, to sell pornographic phone conversations. -Refer to Fact Pattern 14-2. CallTalk wants to sue Call&Talk for its unauthorized use of the domain name "callltalk" on a theory of trademark dilution. This claim requires proof that


A) ​none of the choices.
B) ​consumers are likely to be confused by the names.
C) ​the products involved are similar.
D) ​CallTalk ahs registered all variations of the name "calltalk."

Correct Answer

verifed

verified

Fact Pattern 14-1 Sound Financials Corporation sends daily e-mail ads to its previous customers and those who have opted to receive the notices. Instable Investments, Inc., sends e-mail ads to any e-mail address that Instable can find on the Web or otherwise generate. -Refer to Fact Pattern 14-1. Sound Financials and Instable Investments are subject to the laws of the states in which they are located and do business. Thirty-seven states


A) ​prohibit or regulates the use of spam.
B) ​require the use of spam by business entities.
C) ​ban the use of spam altogether.
D) ​preempt the application of state law to commercial e-mail.

Correct Answer

verifed

verified

Keisha is an employee of Leeway Corporation. She uses social media in a way that violates her employer's stated social media policies. Leeway first disciplines its employee and then, after a second transgression, fires her. This is


A) ​a violation of Keisha's rights as an employee.
B) ​within Leeway's rights as an employer.
C) ​a subject for dispute resolution by the social media that Keisha used.
D) ​a "business-extension exception" under the Electronic Communications Privacy Act.

Correct Answer

verifed

verified

ConnectWeb, Inc., operates a subscription-based service that extends the software and storage capabilities of its subscribers. This is


A) ​dilution.
B) ​peer-to-peer (P2P) networking.
C) ​cloud computing.
D) ​a distributed network.

Correct Answer

verifed

verified

Prodigious Profit, LLC, and other companies operate social media Web sites, issue apps for mobile devices, obtain ad revenue from search engines, and sell directly to consumers from other sites. The privacy rights of the users of these products are frequently defined, not by the courts or legislatures, but by


A) ​the companies that own the sites and the apps.
B) ​retailers who have had to change their procedures to compete.
C) ​spammers, cybersquatters, and typosquatters.
D) ​Internet service providers.

Correct Answer

verifed

verified

Broadband, Inc., an Internet service provider, supplies information to the Federal Trade Commission concerning possible unfair or deceptive ads originating in a foreign jurisdiction. Under federal law, Broadband is


A) ​immune from liability.
B) ​subject to liability if the information is false.
C) ​subject to liability if the ads were sent through B's service.
D) ​subject to liability in the foreign jurisdiction, but not in the United States.

Correct Answer

verifed

verified

Online conduct gives rise to only a narrow variety of legal actions.

Correct Answer

verifed

verified

Criminal liability for the piracy of copyrighted materials extends only to persons who exchanged unauthorized copies for profit.

Correct Answer

verifed

verified

File-sharing software can be used to download others' copyrighted property without liability for any infringement.

Correct Answer

verifed

verified

Fruit Packers, Inc., provides its sales representatives with phones to use in the ordinary course of business. Fruit monitors the employees' electronic communications made through the phones. This is


A) ​a violation of the rights of Fruit's employees.
B) ​within Fruit's rights even if the employer did not provide the phones.
C) ​a subject for dispute resolution by Fruit's phone service.
D) ​a "business-extension exception" under the Electronic Communications Privacy Act.

Correct Answer

verifed

verified

To test computer security and conduct encryption research, Tech Solutions Inc. circumvents the encryption software and other technological antipiracy protection of United Business Corporation's software. Under the Digital Millennium Copyright Act, this is


A) ​a violation of copyright law.
B) ​prohibited but not a violation of copyright law.
C) ​a "fair use" exception to the provisions of the act.
D) ​permitted for reconsideration every three years.

Correct Answer

verifed

verified

Showing 21 - 40 of 72

Related Exams

Show Answer