Deck 11: Digital Law and E-Commerce

ملء الشاشة (f)
exit full mode
سؤال
E-mail contracts need not meet the Statute of Frauds requirements as long as they meet UCITA guidelines.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
ISPs provide e-mail accounts,Internet access,and storage on the Internet to users.
سؤال
LetsConnect is a three-month-old Internet service provider in the United States of America.In the last two months,it was discovered that several LetsConnect users exchanged online material that is illegal in the United States.The ISP took no measures to investigate the matter or prevent it.Which of the following is true of this case?

A)The users of LetsConnect are not liable for the material they exchanged.
B)The ISP is not liable for the content transmitted over its network.
C)The ISP will be prosecuted for abusing the freedom of speech.
D)The ISP will be prosecuted for violating the Communications Decency Act.
سؤال
Parties enter into an electronic mail contract by the use of e-mail.
سؤال
The CAN-SPAM Act does not regulate spam sent to Americans from other countries.
سؤال
The World Wide Web consists of computers that support a standard set of rules for the exchange of information called File Transfer Protocol (FTP).
سؤال
Which of the following statements is true of e-mail contracts?

A)All e-mail contracts require consideration,capacity,and lawful object.
B)E-mail contracts are exempted from the requirements of the Statute of Frauds.
C)E-mail contracts are enforceable even if they do not meet the requirements of a traditional contract.
D)Several e-mails cannot be integrated to determine the parties' agreement.
سؤال
ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
سؤال
Barney wants to rent an apartment and posts an advertisement in a classifieds website.Two days later,Michael,who wants to rent out his apartment,e-mails Barney and they finalize the deal over the Internet.Barney pays Michael through an online transfer.This is an instance of ________.

A)e-licensing
B)e-commerce
C)cybersquatting
D)information licensing
سؤال
Which of the following is true of the CAN-SPAM Act?

A)It regards spam e-mail as a punishable offence.
B)It prohibits spammers from sending sexually-explicit e-mail.
C)It approves businesses to use spam as long as they do not lie.
D)It provides a civil right of action to individuals who have received unsolicited spam.
سؤال
The CAN-SPAM Act does not end spam but instead approves businesses to use spam as long as they do not lie.
سؤال
Which of the following is true of the Communications Decency Act of 1996?

A)Businesses can send spam e-mails,as long as they do not lie.
B)ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
C)Businesses are liable for invading the right to privacy if they send unsolicited e-mails.
D)The number of servers an ISP can access in a geographical location is limited.
سؤال
Which of the following best describes the World Wide Web?

A)a connection of millions of computers that support a standard set of rules for the exchange of information
B)a network of millions of smaller networks,each with an independent set of standards
C)a connection of millions of computers across the world with no specific standards or time constraints for exchange of data
D)a world-wide network of millions of smaller networks with a different standard of information exchange in each country
سؤال
A(n)________ contract refers to a contract that is entered into by the parties by use of e-mail.

A)web
B)online
C)e-mail
D)ISP
سؤال
Which of the following is true of the World Wide Web?

A)Only businesses-not individuals-can have their own websites.
B)Individuals need not register with a service provider to access the web.
C)A website can have several online addresses.
D)Web pages are stored on servers which are operated by Internet service providers.
سؤال
Most Web pages use electronic ordering systems that do not have the ability to evaluate and accept ________.

A)counteroffers
B)e-licenses
C)e-signatures
D)biometric data
سؤال
The term ISP refers to users who disguise computer viruses as executable programs and send them across the Internet.
سؤال
The computers that constitute the World Wide Web use a standard set of rules known as ________ for the exchange of information.

A)POP
B)POP3
C)HTTP
D)IMAP
سؤال
The E-SIGN Act is a not a federal statute,and state legislatures are required to adopt it in order for it to become state law.
سؤال
Which of the following is true of e-commerce?

A)Lessors cannot use web addresses to lease goods.
B)Intellectual property cannot be explicitly listed for sale on a website.
C)An e-mail contract is not binding.
D)Services can be listed for sale on websites.
سؤال
What measures has Congress taken to regulate spam e-mail?
سؤال
A ________ is an owner of intellectual property or information rights who transfers rights in the property or information to another party.

A)lessor
B)lessee
C)licensee
D)licensor
سؤال
KCube Multimedia launches a new game.It permits Ken to download,install,and play the game for three months.This is an instance of a(n)________.

A)e-license
B)lease
C)domain name registration
D)digital signature
سؤال
Which of the following is true of the UCITA?

A)It establishes a uniform set of rules that prohibit all forms of cybersquatting.
B)It establishes the Statute of Frauds for all online content.
C)It aims at eliminating all domain names registered in bad faith.
D)It becomes a law only when a state legislature enacts it as a statute.
سؤال
The World Wide Web consists of millions of computers that support a standard set of rules called ________ for the exchange of information.
سؤال
What is an exclusive license?

A)a license that grants access to exclusive information for a limited period
B)a license that restricts the licensee to some information only
C)a license that is granted to only one party for a specific period
D)a license that grants access to exclusive intellectual property
سؤال
The CAN-SPAM Act requires spammers to label sexually oriented e-mails as such.
سؤال
Data and software do not constitute intellectual property or information rights.
سؤال
Which of the following is true of a license?

A)A license grants the licensee complete control over intellectual property.
B)An exclusive license is granted to only one licensee for a specific period.
C)A licensee has complete control over the information he or she is allowed to access.
D)A licensee has the right to use information rights beyond the licensor's control that are necessary to exercise the expressly described rights.
سؤال
A(n)________ is a contract whereby the owner of a software or a digital application grants limited rights to the owner of a computer or digital device to use the software or digital application for a limited period and under specified conditions.

A)e-license
B)Terms of Service document
C)domain
D)digital signature
سؤال
A license is a contract that transfers complete rights in intellectual property and informational rights.
سؤال
While downloading a license to a software program,Harriet reads the "Terms of Agreement" document which states that the company is not liable for any unforeseen damages that arise from the software.Harriet clicks "Accept" and continues to install the program.The document is an example of a(n)________.

A)digital signature
B)digital identification
C)licensing agreement
D)implicit contract
سؤال
A ________ refers to a party who is granted limited rights in or access to intellectual property or information rights owned by another party.

A)lessor
B)lessee
C)licensee
D)licensor
سؤال
The ________ is a federal statute that places certain restrictions on persons and businesses that send unsolicited commercial advertising to e-mail accounts,prohibits falsified headers,prohibits deceptive subject lines,and requires spammers to label sexually oriented e-mail as such.
سؤال
The ________ provides that Internet service providers are not liable for the content transmitted over their networks by e-mail users and websites.
سؤال
A(n)________ is any computer system that has been established by a seller to accept orders.
سؤال
A ________ refers to a contract that transfers limited rights in intellectual property and information rights.

A)contract
B)tender
C)license
D)domain name
سؤال
Counteroffers are not effective against electronic agents.
سؤال
The ________ establishes a uniform and comprehensive set of rules that govern the creation,performance,and enforcement of computer information transactions.

A)CAN-SPAM Act
B)UCITA
C)ECPA
D)ACPA
سؤال
The ________ is an electronic connection of millions of computers that support a standard set of rules for the exchange of information.
سؤال
The term ________ refers to an owner of intellectual property or informational rights who transfers rights in the property or information to another party.
سؤال
The ________ makes it a crime to intercept an electronic communication at the point of transmission,while in transit,when stored by a router or on a server,or after receipt by the intended recipient.
سؤال
________ are state laws that require certain types of contracts to be in writing.
سؤال
A licensee is a party who is granted limited rights in intellectual property or information rights owned by another person or company.
سؤال
An exclusive license grants the licensee exclusive rights to use information rights for a specified duration.
سؤال
A(n)________ refers to a contract whereby the owner of a software or a digital application grants limited rights to the owner of a computer or digital device to use the software or digital application for a limited period and under specified conditions.
سؤال
What does the E-SIGN Act provide?

A)Contracts delivered electronically are denied effect.
B)Electronic records can be sent to consumers who make a purchase,without their specific consent to receiving the record.
C)An e-signature is treated the same as a pen-inscribed signature.
D)Only smart card verification creates a legally binding signature in cyberspace.
سؤال
The ECPA provides that stored electronic communications may be accessed by the party or entity providing the electronic communication service.
سؤال
The ________ recognizes electronic contracts as meeting the writing requirement of the Statute of Frauds for most contracts.

A)Uniform Contracts Code
B)Uniform Computer Information Transactions Act
C)E-SIGN Act
D)Communications Decency Act
سؤال
Explain in brief the working of an e-license.
سؤال
Who among the following can access Henry's stored electronic communications without violating the ECPA?

A)Henry's colleague at work,who is working on the same project as Henry and needs the information.
B)Henry's wife,who suspects him of adultery.
C)Henry's boss,who suspects him of leaking confidential information.
D)Henry's personal financial advisor,who wants to see if he has sufficient funds to make an investment.
سؤال
If Jim purchases an online license for a computer game,he is an e-licensor.
سؤال
The UCITA makes it illegal to access another person's stored e-mail.
سؤال
The term ________ refers to a party who is granted limited rights in or access to intellectual property or information rights owned by a licensor.
سؤال
The ________ is a model act that establishes a uniform and comprehensive set of rules that govern the creation,performance,and enforcement of computer information transactions.
سؤال
Jessica wants to buy a laptop from the website of CloudFive Computers.Before confirming the purchase,the website asks her to provide biometric identification using an electronic scanner.This is an example of a(n)________.

A)e-license
B)e-signature
C)exclusive license
D)conditional license
سؤال
The ________ is a federal statute that makes it a crime to intercept an electronic communication at the point of transmission,while in transit,when stored by a router or server,or after receipt by the intended recipient.

A)UCITA
B)ECPA
C)ACPA
D)ICANN
سؤال
A(n)________ grants the licensee exclusive rights to use information rights for a specified duration.
سؤال
Which of the following is true of the ECPA?

A)Businesses are allowed to send spam e-mails,as long as they do not lie.
B)ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
C)An e-signature is as effective as a pen-inscribed signature.
D)It is a crime to intercept an electronic communication at the point of transmission.
سؤال
The ________ gives an e-signature the same force and effect as a pen-inscribed signature on paper.
سؤال
The ________ is a federal statute that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.

A)UCITA
B)ACPA
C)ICANN
D)ECPA
سؤال
The .org domain name extension represents a resource website.
سؤال
What is cybersquatting? Can trademark owners recover domain names registered in bad faith?
سؤال
The ________ issued new rules that permit a party to register a domain name with new TLD suffixes that are personalized.

A)UCITA
B)ACPA
C)ICANN
D)ECPA
سؤال
The ACPA is federal statute that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.
سؤال
Registering a domain name of another party's trademarked name or famous person's name is called cybersquatting.
سؤال
Which of the following domain extensions signifies a resource website?

A).com
B).org
C).edu
D).info
سؤال
The Anticybersquatting Consumer Protection Act (ACPA)is a federal statute that makes the misrepresentation of another person,business or organization using inappropriate words,imagery or other media illegal.
سؤال
The ________ permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.
سؤال
Registering a domain name of another party's trademarked name or famous person's name in bad faith is called ________.
سؤال
A(n)________ uniquely identifies an individual's or company's website.

A)e-signature
B)digital footprint
C)e-mail address
D)domain name
سؤال
.bz is a restricted domain extension and can only be used by businesses or organizations in Brazil.
سؤال
Jonathan Smith,a neurosurgeon in Oregon,wants to start a website that makes it possible for neurosurgeons across the world to work collaboratively on medical cases.Which of the following domain name extensions is most appropriate for Smith's website?

A).com
B).org
C).edu
D).pro
سؤال
A network extension is a unique name that identifies an individual's or company's website.
سؤال
The .biz extension is used for large-business and corporate websites.
سؤال
Joan reads e-mails from Harold's personal e-mail folder.Which statute has Joan violated and why? Under what circumstances is she permitted to read Harold's e-mail?
سؤال
________ is the most widely used domain extension in the world.

A).net
B).com
C).biz
D).org
سؤال
Which of the following is the first step in registering a domain name?

A)determining whether any other party already owns the name
B)determining if the name does justice to the image of the company or individual
C)finding an extension that attracts maximum web traffic
D)enrolling with a service provider to host the website
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/78
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Digital Law and E-Commerce
1
E-mail contracts need not meet the Statute of Frauds requirements as long as they meet UCITA guidelines.
False
2
ISPs provide e-mail accounts,Internet access,and storage on the Internet to users.
True
3
LetsConnect is a three-month-old Internet service provider in the United States of America.In the last two months,it was discovered that several LetsConnect users exchanged online material that is illegal in the United States.The ISP took no measures to investigate the matter or prevent it.Which of the following is true of this case?

A)The users of LetsConnect are not liable for the material they exchanged.
B)The ISP is not liable for the content transmitted over its network.
C)The ISP will be prosecuted for abusing the freedom of speech.
D)The ISP will be prosecuted for violating the Communications Decency Act.
B
4
Parties enter into an electronic mail contract by the use of e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
5
The CAN-SPAM Act does not regulate spam sent to Americans from other countries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
6
The World Wide Web consists of computers that support a standard set of rules for the exchange of information called File Transfer Protocol (FTP).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following statements is true of e-mail contracts?

A)All e-mail contracts require consideration,capacity,and lawful object.
B)E-mail contracts are exempted from the requirements of the Statute of Frauds.
C)E-mail contracts are enforceable even if they do not meet the requirements of a traditional contract.
D)Several e-mails cannot be integrated to determine the parties' agreement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
8
ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
9
Barney wants to rent an apartment and posts an advertisement in a classifieds website.Two days later,Michael,who wants to rent out his apartment,e-mails Barney and they finalize the deal over the Internet.Barney pays Michael through an online transfer.This is an instance of ________.

A)e-licensing
B)e-commerce
C)cybersquatting
D)information licensing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is true of the CAN-SPAM Act?

A)It regards spam e-mail as a punishable offence.
B)It prohibits spammers from sending sexually-explicit e-mail.
C)It approves businesses to use spam as long as they do not lie.
D)It provides a civil right of action to individuals who have received unsolicited spam.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
11
The CAN-SPAM Act does not end spam but instead approves businesses to use spam as long as they do not lie.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is true of the Communications Decency Act of 1996?

A)Businesses can send spam e-mails,as long as they do not lie.
B)ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
C)Businesses are liable for invading the right to privacy if they send unsolicited e-mails.
D)The number of servers an ISP can access in a geographical location is limited.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following best describes the World Wide Web?

A)a connection of millions of computers that support a standard set of rules for the exchange of information
B)a network of millions of smaller networks,each with an independent set of standards
C)a connection of millions of computers across the world with no specific standards or time constraints for exchange of data
D)a world-wide network of millions of smaller networks with a different standard of information exchange in each country
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
14
A(n)________ contract refers to a contract that is entered into by the parties by use of e-mail.

A)web
B)online
C)e-mail
D)ISP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is true of the World Wide Web?

A)Only businesses-not individuals-can have their own websites.
B)Individuals need not register with a service provider to access the web.
C)A website can have several online addresses.
D)Web pages are stored on servers which are operated by Internet service providers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
16
Most Web pages use electronic ordering systems that do not have the ability to evaluate and accept ________.

A)counteroffers
B)e-licenses
C)e-signatures
D)biometric data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
17
The term ISP refers to users who disguise computer viruses as executable programs and send them across the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
18
The computers that constitute the World Wide Web use a standard set of rules known as ________ for the exchange of information.

A)POP
B)POP3
C)HTTP
D)IMAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
19
The E-SIGN Act is a not a federal statute,and state legislatures are required to adopt it in order for it to become state law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is true of e-commerce?

A)Lessors cannot use web addresses to lease goods.
B)Intellectual property cannot be explicitly listed for sale on a website.
C)An e-mail contract is not binding.
D)Services can be listed for sale on websites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
21
What measures has Congress taken to regulate spam e-mail?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
22
A ________ is an owner of intellectual property or information rights who transfers rights in the property or information to another party.

A)lessor
B)lessee
C)licensee
D)licensor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
23
KCube Multimedia launches a new game.It permits Ken to download,install,and play the game for three months.This is an instance of a(n)________.

A)e-license
B)lease
C)domain name registration
D)digital signature
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following is true of the UCITA?

A)It establishes a uniform set of rules that prohibit all forms of cybersquatting.
B)It establishes the Statute of Frauds for all online content.
C)It aims at eliminating all domain names registered in bad faith.
D)It becomes a law only when a state legislature enacts it as a statute.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
25
The World Wide Web consists of millions of computers that support a standard set of rules called ________ for the exchange of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
26
What is an exclusive license?

A)a license that grants access to exclusive information for a limited period
B)a license that restricts the licensee to some information only
C)a license that is granted to only one party for a specific period
D)a license that grants access to exclusive intellectual property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
27
The CAN-SPAM Act requires spammers to label sexually oriented e-mails as such.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
28
Data and software do not constitute intellectual property or information rights.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following is true of a license?

A)A license grants the licensee complete control over intellectual property.
B)An exclusive license is granted to only one licensee for a specific period.
C)A licensee has complete control over the information he or she is allowed to access.
D)A licensee has the right to use information rights beyond the licensor's control that are necessary to exercise the expressly described rights.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
30
A(n)________ is a contract whereby the owner of a software or a digital application grants limited rights to the owner of a computer or digital device to use the software or digital application for a limited period and under specified conditions.

A)e-license
B)Terms of Service document
C)domain
D)digital signature
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
31
A license is a contract that transfers complete rights in intellectual property and informational rights.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
32
While downloading a license to a software program,Harriet reads the "Terms of Agreement" document which states that the company is not liable for any unforeseen damages that arise from the software.Harriet clicks "Accept" and continues to install the program.The document is an example of a(n)________.

A)digital signature
B)digital identification
C)licensing agreement
D)implicit contract
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
33
A ________ refers to a party who is granted limited rights in or access to intellectual property or information rights owned by another party.

A)lessor
B)lessee
C)licensee
D)licensor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
34
The ________ is a federal statute that places certain restrictions on persons and businesses that send unsolicited commercial advertising to e-mail accounts,prohibits falsified headers,prohibits deceptive subject lines,and requires spammers to label sexually oriented e-mail as such.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
35
The ________ provides that Internet service providers are not liable for the content transmitted over their networks by e-mail users and websites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
36
A(n)________ is any computer system that has been established by a seller to accept orders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
37
A ________ refers to a contract that transfers limited rights in intellectual property and information rights.

A)contract
B)tender
C)license
D)domain name
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
38
Counteroffers are not effective against electronic agents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
39
The ________ establishes a uniform and comprehensive set of rules that govern the creation,performance,and enforcement of computer information transactions.

A)CAN-SPAM Act
B)UCITA
C)ECPA
D)ACPA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
40
The ________ is an electronic connection of millions of computers that support a standard set of rules for the exchange of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
41
The term ________ refers to an owner of intellectual property or informational rights who transfers rights in the property or information to another party.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
42
The ________ makes it a crime to intercept an electronic communication at the point of transmission,while in transit,when stored by a router or on a server,or after receipt by the intended recipient.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
43
________ are state laws that require certain types of contracts to be in writing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
44
A licensee is a party who is granted limited rights in intellectual property or information rights owned by another person or company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
45
An exclusive license grants the licensee exclusive rights to use information rights for a specified duration.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
46
A(n)________ refers to a contract whereby the owner of a software or a digital application grants limited rights to the owner of a computer or digital device to use the software or digital application for a limited period and under specified conditions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
47
What does the E-SIGN Act provide?

A)Contracts delivered electronically are denied effect.
B)Electronic records can be sent to consumers who make a purchase,without their specific consent to receiving the record.
C)An e-signature is treated the same as a pen-inscribed signature.
D)Only smart card verification creates a legally binding signature in cyberspace.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
48
The ECPA provides that stored electronic communications may be accessed by the party or entity providing the electronic communication service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
49
The ________ recognizes electronic contracts as meeting the writing requirement of the Statute of Frauds for most contracts.

A)Uniform Contracts Code
B)Uniform Computer Information Transactions Act
C)E-SIGN Act
D)Communications Decency Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
50
Explain in brief the working of an e-license.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
51
Who among the following can access Henry's stored electronic communications without violating the ECPA?

A)Henry's colleague at work,who is working on the same project as Henry and needs the information.
B)Henry's wife,who suspects him of adultery.
C)Henry's boss,who suspects him of leaking confidential information.
D)Henry's personal financial advisor,who wants to see if he has sufficient funds to make an investment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
52
If Jim purchases an online license for a computer game,he is an e-licensor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
53
The UCITA makes it illegal to access another person's stored e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
54
The term ________ refers to a party who is granted limited rights in or access to intellectual property or information rights owned by a licensor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
55
The ________ is a model act that establishes a uniform and comprehensive set of rules that govern the creation,performance,and enforcement of computer information transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
56
Jessica wants to buy a laptop from the website of CloudFive Computers.Before confirming the purchase,the website asks her to provide biometric identification using an electronic scanner.This is an example of a(n)________.

A)e-license
B)e-signature
C)exclusive license
D)conditional license
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
57
The ________ is a federal statute that makes it a crime to intercept an electronic communication at the point of transmission,while in transit,when stored by a router or server,or after receipt by the intended recipient.

A)UCITA
B)ECPA
C)ACPA
D)ICANN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
58
A(n)________ grants the licensee exclusive rights to use information rights for a specified duration.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following is true of the ECPA?

A)Businesses are allowed to send spam e-mails,as long as they do not lie.
B)ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
C)An e-signature is as effective as a pen-inscribed signature.
D)It is a crime to intercept an electronic communication at the point of transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
60
The ________ gives an e-signature the same force and effect as a pen-inscribed signature on paper.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
61
The ________ is a federal statute that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.

A)UCITA
B)ACPA
C)ICANN
D)ECPA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
62
The .org domain name extension represents a resource website.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
63
What is cybersquatting? Can trademark owners recover domain names registered in bad faith?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
64
The ________ issued new rules that permit a party to register a domain name with new TLD suffixes that are personalized.

A)UCITA
B)ACPA
C)ICANN
D)ECPA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
65
The ACPA is federal statute that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
66
Registering a domain name of another party's trademarked name or famous person's name is called cybersquatting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
67
Which of the following domain extensions signifies a resource website?

A).com
B).org
C).edu
D).info
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
68
The Anticybersquatting Consumer Protection Act (ACPA)is a federal statute that makes the misrepresentation of another person,business or organization using inappropriate words,imagery or other media illegal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
69
The ________ permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
70
Registering a domain name of another party's trademarked name or famous person's name in bad faith is called ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
71
A(n)________ uniquely identifies an individual's or company's website.

A)e-signature
B)digital footprint
C)e-mail address
D)domain name
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
72
.bz is a restricted domain extension and can only be used by businesses or organizations in Brazil.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
73
Jonathan Smith,a neurosurgeon in Oregon,wants to start a website that makes it possible for neurosurgeons across the world to work collaboratively on medical cases.Which of the following domain name extensions is most appropriate for Smith's website?

A).com
B).org
C).edu
D).pro
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
74
A network extension is a unique name that identifies an individual's or company's website.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
75
The .biz extension is used for large-business and corporate websites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
76
Joan reads e-mails from Harold's personal e-mail folder.Which statute has Joan violated and why? Under what circumstances is she permitted to read Harold's e-mail?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
77
________ is the most widely used domain extension in the world.

A).net
B).com
C).biz
D).org
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following is the first step in registering a domain name?

A)determining whether any other party already owns the name
B)determining if the name does justice to the image of the company or individual
C)finding an extension that attracts maximum web traffic
D)enrolling with a service provider to host the website
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.