Deck 11: Cyberlaw

ملء الشاشة (f)
exit full mode
سؤال
The formation of contracts in cyberspace is always governed by the law of the United States.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The term "cyberlaw" refers to laws and precedent applicable to Internet transactions and communications.
سؤال
Employers have access and control rights to their employees' e-mail.
سؤال
Web site operators are free to plant "cookies" on computers with no fear of action for breach of unauthorized access or privacy.
سؤال
Employees may waive their attorney-client privileges when using their work computers for communication.
سؤال
Cyberlaw is a completely new area of law,unrelated to any established field of law.
سؤال
Contract formation in cyberspace is the result of a desire for businesses to use a common language to form contracts.
سؤال
Cleaning up your name on Google using one of several services is a good way to eliminate any suspicions perspective or current employers may have about you.
سؤال
The key to being able to have Internet Service Providers (ISPs)release identities of those who post statements on the Internet is whether the posters were engaged in illegal or harmful activities.
سؤال
The Electronic Communications Privacy Act of 1986 (ECPA)is useful in resolving privacy issue questions.
سؤال
The term "cyberspace" describes the World Wide Web and Internet communication.
سؤال
Appropriation involves taking an image,likeness,or name for purposes of commercial advantage.
سؤال
Sock-puppeting is anonymous blogging that flatters the blogger's company and bashes one or more competitors.
سؤال
It is a crime to post nasty opinions about someone in an Internet chat room.
سؤال
The tort of invasion of privacy has some application to cyberspace communication.
سؤال
Potential employers are free to do pre-hiring monitoring of applicants without their knowledge.
سؤال
Legal issues in cyberspace include appropriation and competition issues.
سؤال
Employers are required to give notice to employees that they will monitor their employees' e-mail.
سؤال
Employers are accountable when employee use e-mails to defame competitors.
سؤال
The law of real property is included in those categories of legal issues covered by cyberlaw.
سؤال
The majority of fraud complaints received by the FBI relate to:

A) sales from large online only retailers.
B) sales from traditional retailers who also operate on the Internet.
C) private Internet sales (one individual to another).
D) Internet auctions.
سؤال
Misrepresentation and fraud on the Internet raises a variety of new legal issues.
سؤال
The distinction between offer and acceptance is no longer relevant in cyberlaw.
سؤال
Legal issues of Cyberspace include:

A) employment issues.
B) user issues.
C) contract issues.
D) all of the above.
سؤال
Companies who have misrepresented the capabilities of their search engines or failed to disclose the methods whereby they give preference to certain links:

A) may be liable for fraud,but are not responsible for either rescission or damages.
B) may be liable for fraud,but if so are only responsible for rescission.
C) may be liable for fraud,but if so are only responsible for damages.
D) may be liable for fraud,and if so might be responsible for rescission or damages.
سؤال
__________ is a federal law that recognizes digital signatures as authentic for purposes of contract formation.

A) Cyber-sign
B) We-sign
C) Electra-sign
D) E-sign
سؤال
Federal law now recognizes the validity of electronic signatures.
سؤال
The Federal Trade Commission (FTC)has begun to take positions on Internet issues that are:

A) tailored to Cyberspace.
B) specific to the type of website that has the issue.
C) identical to its stances of other types of commerce issues.
D) none of the above.
سؤال
Plaintiffs can successfully subpoena Internet Service Providers (ISPs)to obtain the identify of individuals who make defamatory remarks:

A) in all cases.
B) only when the information posted is false.
C) only when the information posted is true.
D) ISPs are never required to disclose identity.
سؤال
Employee e-mail is:

A) spontaneous.
B) candid.
C) discoverable.
D) all of the above.
سؤال
When employers allow employees to reimburse the employer for private use of text services,employer monitoring and disclosure of those texts is:

A) always legal.
B) only legal if the employee gives his or her consent.
C) only legal for texts that are sent and received during work hours.
D) a violation of the law.
سؤال
Sales tax on Internet sales:

A) is never collected.
B) is always collected.
C) is collected if the seller has a physical presence in the state of sale.
D) follow the same rules for sales tax collected in brick and mortar stores.
سؤال
The taking of an image off someone's web site and using it for commercial advantage is called:

A) appropriation.
B) defamation.
C) gleaning.
D) subordination.
سؤال
__________ refers to laws and precedent applicable to Internet transactions and communications.

A) Cyberlaw
B) Cyborglaw
C) Silicalaw
D) Simlaw
سؤال
Contracts in cyberspace:

A) are formed as a result of the desire for speed.
B) are formed using purchase orders and invoices submitted via computer.
C) require both an offer and an acceptance.
D) all of the above.
سؤال
Statutory protections for privacy in cyberspace:

A) include state laws that are difficult to enforce against web sponsors with no presence in the state.
B) often address specific issues such as financial information rather than general protections .
C) may not protect an individual from federal agency "routine use".
D) all of the above.
سؤال
The Internet Tax Freedom Act (ITFA)prohibits companies from charging sales tax on Internet transactions.
سؤال
Describe the rights of employers to monitor the e-mail of employees who are using their employers' email system.

A) Employers may monitor employees' e-mails,but only if the employees have consented.
B) Employers may monitor employees' e-mails,regardless of whether employees have consented.
C) Employers may monitor employees' e-mails,but only if notice is given.
D) Employers may not monitor employees' e-mails.
سؤال
The formation of contracts in cyberspace is governed today largely by:

A) international contract law principles.
B) traditional contract law principles.
C) federal contract law principles.
D) uniform state laws.
سؤال
Federal law requires all companies who market search engines on the Internet to create and abide by a search engine code of ethics.
سؤال
Bon,located in Florida,desires to enter into a contract with Jon,a resident of Maine.Neither wishes to meet face-to-face,as both are busy with a variety of business interests.Instead,they wish to form a contract over the Internet.Would a contract formed over the Internet be valid?
سؤال
Roxy is employed as a manager at "com.com," an Internet-based company attempting to compete successfully in the highly competitive software development industry.Roxy is concerned that one of her employees,Randy,is not performing at an acceptable level.While Roxy has noticed that Randy spends considerable time using the computer at his workstation,his productivity is lacking.Roxy suspects Randy is using the company's e-mail system for personal use instead of working on company business.Is Roxy permitted to monitor Randy's email?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Cyberlaw
1
The formation of contracts in cyberspace is always governed by the law of the United States.
False
2
The term "cyberlaw" refers to laws and precedent applicable to Internet transactions and communications.
True
3
Employers have access and control rights to their employees' e-mail.
True
4
Web site operators are free to plant "cookies" on computers with no fear of action for breach of unauthorized access or privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
Employees may waive their attorney-client privileges when using their work computers for communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
Cyberlaw is a completely new area of law,unrelated to any established field of law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
Contract formation in cyberspace is the result of a desire for businesses to use a common language to form contracts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
Cleaning up your name on Google using one of several services is a good way to eliminate any suspicions perspective or current employers may have about you.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
The key to being able to have Internet Service Providers (ISPs)release identities of those who post statements on the Internet is whether the posters were engaged in illegal or harmful activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
The Electronic Communications Privacy Act of 1986 (ECPA)is useful in resolving privacy issue questions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
The term "cyberspace" describes the World Wide Web and Internet communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
Appropriation involves taking an image,likeness,or name for purposes of commercial advantage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
Sock-puppeting is anonymous blogging that flatters the blogger's company and bashes one or more competitors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
It is a crime to post nasty opinions about someone in an Internet chat room.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The tort of invasion of privacy has some application to cyberspace communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
Potential employers are free to do pre-hiring monitoring of applicants without their knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
Legal issues in cyberspace include appropriation and competition issues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
Employers are required to give notice to employees that they will monitor their employees' e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
Employers are accountable when employee use e-mails to defame competitors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
The law of real property is included in those categories of legal issues covered by cyberlaw.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
The majority of fraud complaints received by the FBI relate to:

A) sales from large online only retailers.
B) sales from traditional retailers who also operate on the Internet.
C) private Internet sales (one individual to another).
D) Internet auctions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
Misrepresentation and fraud on the Internet raises a variety of new legal issues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
The distinction between offer and acceptance is no longer relevant in cyberlaw.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
Legal issues of Cyberspace include:

A) employment issues.
B) user issues.
C) contract issues.
D) all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
Companies who have misrepresented the capabilities of their search engines or failed to disclose the methods whereby they give preference to certain links:

A) may be liable for fraud,but are not responsible for either rescission or damages.
B) may be liable for fraud,but if so are only responsible for rescission.
C) may be liable for fraud,but if so are only responsible for damages.
D) may be liable for fraud,and if so might be responsible for rescission or damages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
__________ is a federal law that recognizes digital signatures as authentic for purposes of contract formation.

A) Cyber-sign
B) We-sign
C) Electra-sign
D) E-sign
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Federal law now recognizes the validity of electronic signatures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
The Federal Trade Commission (FTC)has begun to take positions on Internet issues that are:

A) tailored to Cyberspace.
B) specific to the type of website that has the issue.
C) identical to its stances of other types of commerce issues.
D) none of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Plaintiffs can successfully subpoena Internet Service Providers (ISPs)to obtain the identify of individuals who make defamatory remarks:

A) in all cases.
B) only when the information posted is false.
C) only when the information posted is true.
D) ISPs are never required to disclose identity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
Employee e-mail is:

A) spontaneous.
B) candid.
C) discoverable.
D) all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
When employers allow employees to reimburse the employer for private use of text services,employer monitoring and disclosure of those texts is:

A) always legal.
B) only legal if the employee gives his or her consent.
C) only legal for texts that are sent and received during work hours.
D) a violation of the law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
Sales tax on Internet sales:

A) is never collected.
B) is always collected.
C) is collected if the seller has a physical presence in the state of sale.
D) follow the same rules for sales tax collected in brick and mortar stores.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
The taking of an image off someone's web site and using it for commercial advantage is called:

A) appropriation.
B) defamation.
C) gleaning.
D) subordination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
__________ refers to laws and precedent applicable to Internet transactions and communications.

A) Cyberlaw
B) Cyborglaw
C) Silicalaw
D) Simlaw
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
Contracts in cyberspace:

A) are formed as a result of the desire for speed.
B) are formed using purchase orders and invoices submitted via computer.
C) require both an offer and an acceptance.
D) all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
Statutory protections for privacy in cyberspace:

A) include state laws that are difficult to enforce against web sponsors with no presence in the state.
B) often address specific issues such as financial information rather than general protections .
C) may not protect an individual from federal agency "routine use".
D) all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
The Internet Tax Freedom Act (ITFA)prohibits companies from charging sales tax on Internet transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Describe the rights of employers to monitor the e-mail of employees who are using their employers' email system.

A) Employers may monitor employees' e-mails,but only if the employees have consented.
B) Employers may monitor employees' e-mails,regardless of whether employees have consented.
C) Employers may monitor employees' e-mails,but only if notice is given.
D) Employers may not monitor employees' e-mails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
The formation of contracts in cyberspace is governed today largely by:

A) international contract law principles.
B) traditional contract law principles.
C) federal contract law principles.
D) uniform state laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Federal law requires all companies who market search engines on the Internet to create and abide by a search engine code of ethics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Bon,located in Florida,desires to enter into a contract with Jon,a resident of Maine.Neither wishes to meet face-to-face,as both are busy with a variety of business interests.Instead,they wish to form a contract over the Internet.Would a contract formed over the Internet be valid?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Roxy is employed as a manager at "com.com," an Internet-based company attempting to compete successfully in the highly competitive software development industry.Roxy is concerned that one of her employees,Randy,is not performing at an acceptable level.While Roxy has noticed that Randy spends considerable time using the computer at his workstation,his productivity is lacking.Roxy suspects Randy is using the company's e-mail system for personal use instead of working on company business.Is Roxy permitted to monitor Randy's email?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.