Deck 18: Internet Law and Ethics

Full screen (f)
exit full mode
Question
Internet users in the United States pay a fee to Internet service providers for the type and level of service they desire.
Use Space or
up arrow
down arrow
to flip the card.
Question
For wired broadband services,net neutrality rules prohibit blocking of "lawful content,applications,services,or non-harmful devices."
Question
The Internet delivers private communications between particular users,much as a phone system.
Question
Commercial speech has not been accorded any protection under the First Amendment of the U.S.Constitution.
Question
Net neutrality implies that Internet service providers will discriminate against the traffic of legal content providers.
Question
Which of the following statements is true of the digital divide in the United States?

A)Although nearly 98 percent of American households are located where broadband is available,60 percent of American adults are not connected.
B)The percentage of Internet users in certain areas such as California is much lower than some other areas such as Mississippi.
C)Seventy-six percent of white households are connected to the Internet,but only 57 percent of African-American households are connected.
D)Ninety percent of those under 65 use the Internet,but only about 50 percent of those 65 and older use the Internet.
Question
The Internet is increasing national boundaries.
Question
Spam is an electronic form of junk mail.
Question
As per the rules issued by the Federal Communications Commission in December 2010,Internet service providers are allowed to block consumer access to "lawful websites" and "applications that compete with the provider's voice or video telephony services."
Question
Google and Facebook and other advertising-driven business models sell their users' data to pay for the services they give without charge to their users.
Question
The Uniform Computer Information Transactions Act,which governs software and Internet transactions as well as issues associated with software licensure,has now been adopted by a majority of states.
Question
The European Union has negotiated certain safe harbors for U.S.companies not complying with its Data Protection Directive,which allows individuals to decide how their personal information can be used.
Question
People and businesses can choose any domain name they want just by telling their Internet service provider that that is how they want to be known.
Question
The Council of Europe has proffered the Convention on Cybercrime as an international effort to address computer-facilitated crime.
Question
Punishment for violation of the Computer Fraud and Abuse Act of 1986 is limited to fines.
Question
The Federal Trade Commission has expanded the definition of "personal information" to include not just names,phone numbers,home and e-mail address,but also mobile phone serial numbers.
Question
The Court in Capitol Records v.ReDIGI held that songs bought from Apple's iTunes and similar retailers cannot be resold by the original purchaser under the first sale doctrine because the doctrine protects only the owner of a particular copy.
Question
Electronic signatures are not legal in the U.S.because Congress failed to pass the Electronic Signatures in Global and National Commerce Act.
Question
The drastic increase in the number of people having access to the Internet has been made possible,in part because of the relatively cheap access offered by cell phones in comparison with the cost of computers.
Question
The United States has a comprehensive privacy law addressing the Internet environment.
Question
Which of the following federal acts establishes both civil and criminal penalties for violations of its provisions?

A)The CAN-SPAM Act
B)The PROTECT Act
C)The U.S.SAFE WEB Act
D)The Anti-Phishing Act
Question
The Communications Decency Act of 1996 violated the _____.

A)Sixth Amendment
B)Eighth Amendment
C)First Amendment
D)Fourth Amendment
Question
The _____ is charged with primary enforcement of the Children's Online Privacy Protection Act (COPPA).

A)Consumer Financial Protection Bureau
B)Federal Trade Commission
C)Consumer Product Safety Commission
D)Food and Drug Administration
Question
Which of the following statements is true of the Electronic Signatures in Global and National Commerce Act (E-SIGN)?

A)President Clinton had refused to sign it into law.
B)Under this act,consumers cannot be forced to accept electronic signature agreements.
C)It forces consumers to receive records and documents electronically rather than in paper form.
D)It does not give electronic signatures the same legal stature as handwritten ones.
Question
If people wish to connect to the Internet,they contract with a commercial Internet service provider and pay a fee for the type and level of service they desire.They then have access to any content provider.This uniform access is referred to as _____.

A)net equality
B)net connectivity
C)net neutrality
D)net activity
Question
A(n) _____ is any person who takes data that are discrete at the level of an individual and combines it with individual-level data from one or more other sources.

A)aggregator
B)hacker
C)cyber stalker
D)spammer
Question
_____ is the process of building profiles of individuals by organizing all the disparate pieces of information collected in the normal course of business.

A)Data mining
B)Phishing
C)Hacking
D)Whistleblowing
Question
Which of the following is a provision of the Computer Pornography and Child Exploitation Prevention Act of 1999?

A)It prohibits websites from collecting personal information from children under 13,who use computers,without parental permission.
B)It requires that parents be allowed to review and correct any information collected about their children and published.
C)It makes it unlawful for companies manufacturing computers to employ children below the age of 15.
D)It makes it unlawful to use a computer to solicit,lure,or entice a child or otherwise engage in sexual offenses with a child.
Question
When a country seeks to apply its own laws to foreigners,the question is whether the country has _____.

A)jurisdiction to enforce
B)jurisdiction to prescribe
C)jurisdiction to adjudicate
D)jurisdiction to legislate
Question
The repeated use of electronic media (such as e-mail or chat rooms) to harass or threaten another person is referred to as:

A)cyberterrorism.
B)spear phishing.
C)cyberstalking.
D)VoIP spamming.
Question
In the international context,_____ refers to judicial personal jurisdiction.

A)jurisdiction to enforce
B)jurisdiction to prescribe
C)jurisdiction to legislate
D)jurisdiction to adjudicate
Question
Which of the following statements is true of the digital divide at the global level?

A)Only 5.6 percent of Africa's citizens have access to the Internet,compared with 78.6 percent in North America.
B)Only 24 percent of the population in sub-Saharan Africa has access to the Internet,compared with 80.6 percent in North America.
C)Although nearly 90 percent of households are located where broadband is available,60 percent of adults are not connected to the Internet.
D)The number of Internet connections is growing by less than 9 percent annually,but just over one-third of the population is connected.
Question
In December 2010,the Federal Communications Commission (FCC) issued new rules on net neutrality to address net neutrality issues.Which of the following statements is true of these rules?

A)Wired broadband services were permitted to block "lawful content,applications,services,or non-harmful devices."
B)Wireless broadband services were subject to the same disclosure rules as the wired broadband services but were granted more leeway with regard to equal access.
C)Wired broadband services were permitted to block consumer access to lawful websites that competed with their video telephony services.
D)Wireless broadband services were allowed to withhold information regarding network performance.
Question
In the context of the Internet,what is the reason for the access imbalance that exists in the United States?

A)Availability of service is a problem in the United States.
B)Digital literacy is an issue in the United States.
C)Security concern in the United States is high.
D)About 98 percent of American households are located where broadband is absent.
Question
The _____ protects citizens from government restraints on the content of speech,although reasonable restraints on the context (time,place,and manner) of that speech are sometimes constitutionally permissible.

A)Sixth Amendment
B)Eighth Amendment
C)First Amendment
D)Fourth Amendment
Question
The _____ proffered the Convention on Cybercrime as an international effort to address computer-facilitated crime.

A)United States Secretary of Commerce
B)Federal Trade Commission
C)Council of Europe
D)Department of Commerce
Question
Catalina has been receiving threat messages from Steve,one of her Facebook contacts.Steve has never met Catalina,but he has been tracking her activities on the social network regularly.This is an example of:

A)cyberterrorism.
B)spear phishing.
C)cyberstalking.
D)VoIP spamming.
Question
Which of the following is a network of infected computers that can be harnessed to take coordinated action,such as sending spam?

A)Botnet
B)Adware
C)Malware
D)Spambot
Question
The Children's Online Privacy Protection Act:

A)makes it unlawful to use computers to solicit,lure,or entice a child,but it does not include the content of mobile phones.
B)seeks to criminalize online content "harmful to minors" based on "contemporary community standards."
C)prohibits not just actual child pornography,but also material that depicts persons who "appear to be minors" or that is presented so it "conveys the impression" that the person depicted is a minor.
D)prohibits websites from collecting personal information from children under 13 without parental permission.
Question
Which of the following is charged with enforcing the CAN-SPAM Act?

A)The United States Commercial Service
B)The Federal Trade Commission
C)The United States Department of Commerce
D)The U.S.Securities and Exchange Commission
Question
Which of the following statements is true of the Uniform Computer Information Transactions Act?

A)It has not been widely approved in the U.S.
B)It focuses on procedural aspects such as electronic signatures.
C)It has been amended once.
D)It has been adopted in 20 of the 50 states.
Question
Discuss the basic tax issue that arises from cyberspace transactions.
Question
Briefly describe the "digital divide" that exists in the United States.
Question
Lavender,a beauty salon,uses the symbol of a bouquet of lavender flowers,tied with a maroon ribbon to distinguish its packages from its rivals.The symbol used by Lavender is an example of a _____.

A)patent
B)domain name
C)service mark
D)copyright
Question
The Internet address for a Web page is called its:

A)Internet service provider.
B)domain name.
C)server.
D)search engine.
Question
Describe the European Union's approach to privacy concerns raised by the Internet.
Question
The doctrine that allows utilization of copyrighted material without permission under some conditions,such as limited,nonprofit use in a classroom,is known as the:

A)first sale doctrine.
B)first purchase doctrine.
C)fair control doctrine.
D)fair use doctrine.
Question
Describe "Jurisdiction in International Suits." Identify the circumstances under which countries have exercised their jurisdiction to adjudicate.
Question
So far the Uniform Computer Information Transactions Act has been adopted only in the states of Maryland and _____.

A)California
B)Texas
C)Virginia
D)Ohio
Question
Discuss the assignment of Internet domain names.
Question
Which of the following is most likely to be a standard-essential patent?

A)A keyboard with a unique design
B)A technology that enables communication through satellite phones
C)A technology that enables enhanced voice recording in a smartphone
D)A wireless mouse for laptops
Question
Define the term "click-wrap agreements." Identify one problem it might create for consumers.
Question
Explain in brief a free speech issue in the context of online pornography.Describe the role of the judiciary and the Congress in handling this issue.
Question
Patents that address matters of basic communication and data handling which support and permit industrywide norms are called _____.

A)standard-essential patents
B)design patents
C)utility patents
D)quasi-legal patents
Question
Identify and discuss an ethical issue raised by the global nature of the Internet.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/55
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 18: Internet Law and Ethics
1
Internet users in the United States pay a fee to Internet service providers for the type and level of service they desire.
True
Explanation: If someone in the United States wishes to connect to the Internet,they contract with a commercial Internet service provider (ISP) (such as AT&T,Comcast,or Verizon) and pay a fee for the type (such as dial-up or broadband) and level of service (such as speed,data volume,and length of term) they desire.They then have access to any content provider (such as Amazon,Craigslist,Google,and YouTube).
2
For wired broadband services,net neutrality rules prohibit blocking of "lawful content,applications,services,or non-harmful devices."
True
Explanation: In December 2010,the Federal Communications Commission (FCC) issued new rules on net neutrality.For wired broadband services,the rules prohibited blocking of "lawful content,applications,services,or non-harmful devices" and compelled disclosure regarding network performance and the principles that would be used to manage network congestion.
3
The Internet delivers private communications between particular users,much as a phone system.
True
Explanation: The Internet delivers private communications between particular users,much as a phone system.In general,Western governments do not censor private communications,but they do at times seek information from carriers about the existence of participants in private communications.
4
Commercial speech has not been accorded any protection under the First Amendment of the U.S.Constitution.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
5
Net neutrality implies that Internet service providers will discriminate against the traffic of legal content providers.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following statements is true of the digital divide in the United States?

A)Although nearly 98 percent of American households are located where broadband is available,60 percent of American adults are not connected.
B)The percentage of Internet users in certain areas such as California is much lower than some other areas such as Mississippi.
C)Seventy-six percent of white households are connected to the Internet,but only 57 percent of African-American households are connected.
D)Ninety percent of those under 65 use the Internet,but only about 50 percent of those 65 and older use the Internet.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
7
The Internet is increasing national boundaries.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
8
Spam is an electronic form of junk mail.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
9
As per the rules issued by the Federal Communications Commission in December 2010,Internet service providers are allowed to block consumer access to "lawful websites" and "applications that compete with the provider's voice or video telephony services."
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
10
Google and Facebook and other advertising-driven business models sell their users' data to pay for the services they give without charge to their users.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
11
The Uniform Computer Information Transactions Act,which governs software and Internet transactions as well as issues associated with software licensure,has now been adopted by a majority of states.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
12
The European Union has negotiated certain safe harbors for U.S.companies not complying with its Data Protection Directive,which allows individuals to decide how their personal information can be used.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
13
People and businesses can choose any domain name they want just by telling their Internet service provider that that is how they want to be known.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
14
The Council of Europe has proffered the Convention on Cybercrime as an international effort to address computer-facilitated crime.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
15
Punishment for violation of the Computer Fraud and Abuse Act of 1986 is limited to fines.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
16
The Federal Trade Commission has expanded the definition of "personal information" to include not just names,phone numbers,home and e-mail address,but also mobile phone serial numbers.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
17
The Court in Capitol Records v.ReDIGI held that songs bought from Apple's iTunes and similar retailers cannot be resold by the original purchaser under the first sale doctrine because the doctrine protects only the owner of a particular copy.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
18
Electronic signatures are not legal in the U.S.because Congress failed to pass the Electronic Signatures in Global and National Commerce Act.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
19
The drastic increase in the number of people having access to the Internet has been made possible,in part because of the relatively cheap access offered by cell phones in comparison with the cost of computers.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
20
The United States has a comprehensive privacy law addressing the Internet environment.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following federal acts establishes both civil and criminal penalties for violations of its provisions?

A)The CAN-SPAM Act
B)The PROTECT Act
C)The U.S.SAFE WEB Act
D)The Anti-Phishing Act
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
22
The Communications Decency Act of 1996 violated the _____.

A)Sixth Amendment
B)Eighth Amendment
C)First Amendment
D)Fourth Amendment
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
23
The _____ is charged with primary enforcement of the Children's Online Privacy Protection Act (COPPA).

A)Consumer Financial Protection Bureau
B)Federal Trade Commission
C)Consumer Product Safety Commission
D)Food and Drug Administration
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following statements is true of the Electronic Signatures in Global and National Commerce Act (E-SIGN)?

A)President Clinton had refused to sign it into law.
B)Under this act,consumers cannot be forced to accept electronic signature agreements.
C)It forces consumers to receive records and documents electronically rather than in paper form.
D)It does not give electronic signatures the same legal stature as handwritten ones.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
25
If people wish to connect to the Internet,they contract with a commercial Internet service provider and pay a fee for the type and level of service they desire.They then have access to any content provider.This uniform access is referred to as _____.

A)net equality
B)net connectivity
C)net neutrality
D)net activity
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
26
A(n) _____ is any person who takes data that are discrete at the level of an individual and combines it with individual-level data from one or more other sources.

A)aggregator
B)hacker
C)cyber stalker
D)spammer
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
27
_____ is the process of building profiles of individuals by organizing all the disparate pieces of information collected in the normal course of business.

A)Data mining
B)Phishing
C)Hacking
D)Whistleblowing
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is a provision of the Computer Pornography and Child Exploitation Prevention Act of 1999?

A)It prohibits websites from collecting personal information from children under 13,who use computers,without parental permission.
B)It requires that parents be allowed to review and correct any information collected about their children and published.
C)It makes it unlawful for companies manufacturing computers to employ children below the age of 15.
D)It makes it unlawful to use a computer to solicit,lure,or entice a child or otherwise engage in sexual offenses with a child.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
29
When a country seeks to apply its own laws to foreigners,the question is whether the country has _____.

A)jurisdiction to enforce
B)jurisdiction to prescribe
C)jurisdiction to adjudicate
D)jurisdiction to legislate
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
30
The repeated use of electronic media (such as e-mail or chat rooms) to harass or threaten another person is referred to as:

A)cyberterrorism.
B)spear phishing.
C)cyberstalking.
D)VoIP spamming.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
31
In the international context,_____ refers to judicial personal jurisdiction.

A)jurisdiction to enforce
B)jurisdiction to prescribe
C)jurisdiction to legislate
D)jurisdiction to adjudicate
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following statements is true of the digital divide at the global level?

A)Only 5.6 percent of Africa's citizens have access to the Internet,compared with 78.6 percent in North America.
B)Only 24 percent of the population in sub-Saharan Africa has access to the Internet,compared with 80.6 percent in North America.
C)Although nearly 90 percent of households are located where broadband is available,60 percent of adults are not connected to the Internet.
D)The number of Internet connections is growing by less than 9 percent annually,but just over one-third of the population is connected.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
33
In December 2010,the Federal Communications Commission (FCC) issued new rules on net neutrality to address net neutrality issues.Which of the following statements is true of these rules?

A)Wired broadband services were permitted to block "lawful content,applications,services,or non-harmful devices."
B)Wireless broadband services were subject to the same disclosure rules as the wired broadband services but were granted more leeway with regard to equal access.
C)Wired broadband services were permitted to block consumer access to lawful websites that competed with their video telephony services.
D)Wireless broadband services were allowed to withhold information regarding network performance.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
34
In the context of the Internet,what is the reason for the access imbalance that exists in the United States?

A)Availability of service is a problem in the United States.
B)Digital literacy is an issue in the United States.
C)Security concern in the United States is high.
D)About 98 percent of American households are located where broadband is absent.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
35
The _____ protects citizens from government restraints on the content of speech,although reasonable restraints on the context (time,place,and manner) of that speech are sometimes constitutionally permissible.

A)Sixth Amendment
B)Eighth Amendment
C)First Amendment
D)Fourth Amendment
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
36
The _____ proffered the Convention on Cybercrime as an international effort to address computer-facilitated crime.

A)United States Secretary of Commerce
B)Federal Trade Commission
C)Council of Europe
D)Department of Commerce
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
37
Catalina has been receiving threat messages from Steve,one of her Facebook contacts.Steve has never met Catalina,but he has been tracking her activities on the social network regularly.This is an example of:

A)cyberterrorism.
B)spear phishing.
C)cyberstalking.
D)VoIP spamming.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is a network of infected computers that can be harnessed to take coordinated action,such as sending spam?

A)Botnet
B)Adware
C)Malware
D)Spambot
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
39
The Children's Online Privacy Protection Act:

A)makes it unlawful to use computers to solicit,lure,or entice a child,but it does not include the content of mobile phones.
B)seeks to criminalize online content "harmful to minors" based on "contemporary community standards."
C)prohibits not just actual child pornography,but also material that depicts persons who "appear to be minors" or that is presented so it "conveys the impression" that the person depicted is a minor.
D)prohibits websites from collecting personal information from children under 13 without parental permission.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is charged with enforcing the CAN-SPAM Act?

A)The United States Commercial Service
B)The Federal Trade Commission
C)The United States Department of Commerce
D)The U.S.Securities and Exchange Commission
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following statements is true of the Uniform Computer Information Transactions Act?

A)It has not been widely approved in the U.S.
B)It focuses on procedural aspects such as electronic signatures.
C)It has been amended once.
D)It has been adopted in 20 of the 50 states.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
42
Discuss the basic tax issue that arises from cyberspace transactions.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
43
Briefly describe the "digital divide" that exists in the United States.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
44
Lavender,a beauty salon,uses the symbol of a bouquet of lavender flowers,tied with a maroon ribbon to distinguish its packages from its rivals.The symbol used by Lavender is an example of a _____.

A)patent
B)domain name
C)service mark
D)copyright
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
45
The Internet address for a Web page is called its:

A)Internet service provider.
B)domain name.
C)server.
D)search engine.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
46
Describe the European Union's approach to privacy concerns raised by the Internet.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
47
The doctrine that allows utilization of copyrighted material without permission under some conditions,such as limited,nonprofit use in a classroom,is known as the:

A)first sale doctrine.
B)first purchase doctrine.
C)fair control doctrine.
D)fair use doctrine.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
48
Describe "Jurisdiction in International Suits." Identify the circumstances under which countries have exercised their jurisdiction to adjudicate.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
49
So far the Uniform Computer Information Transactions Act has been adopted only in the states of Maryland and _____.

A)California
B)Texas
C)Virginia
D)Ohio
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
50
Discuss the assignment of Internet domain names.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is most likely to be a standard-essential patent?

A)A keyboard with a unique design
B)A technology that enables communication through satellite phones
C)A technology that enables enhanced voice recording in a smartphone
D)A wireless mouse for laptops
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
52
Define the term "click-wrap agreements." Identify one problem it might create for consumers.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
53
Explain in brief a free speech issue in the context of online pornography.Describe the role of the judiciary and the Congress in handling this issue.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
54
Patents that address matters of basic communication and data handling which support and permit industrywide norms are called _____.

A)standard-essential patents
B)design patents
C)utility patents
D)quasi-legal patents
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
55
Identify and discuss an ethical issue raised by the global nature of the Internet.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 55 flashcards in this deck.