Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a violation of copyright law.
B) a "fair use" exception to the provisions of the act.
C) not a "fair use" exception to the provisions of the act.
D) all of the choices.
Correct Answer
verified
Multiple Choice
A) a violation of Keisha's rights as an employee.
B) within Leeway's rights as an employer.
C) a subject for dispute resolution by the social media that Keisha used.
D) a "business-extension exception" under the Electronic Communications Privacy Act.
Correct Answer
verified
Multiple Choice
A) a violation of the rights of Oversight's employee.
B) within Oversight's rights as an employer.
C) a subject for dispute resolution by the communications providers that Oversight uses.
D) a "business-extension exception" under the Electronic Communications Privacy Act.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) cybersquatting.
B) typosquatting.
C) trademark infringement.
D) trademark dilution.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) an invasion of privacy.
B) trademark and copyright infringement.
C) digital sampling.
D) a distributed network.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) included in discovery in litigation.
B) used by law enforcement to detect and prosecute criminals.
C) used by federal regulators in investigations into illegal activities.
D) all of the choices.Fact Pattern 5-2 CallTalk Corporation, a smartphone and phone-time seller, chooses to use and register "calltalk" as its domain name.Later, CallTalk's less successful competitor, CellTalk Company, chooses to use and register "caltalk" (an intentional misspelling of "calltalk") as its domain name.Still later, Call&Talk, Inc., uses the domain name "calltalk" (also a deliberate misspelling of "calltalk") without CallTalk's authorization, to sell pornographic phone conversations.
Correct Answer
verified
Multiple Choice
A) dilution.
B) peer-to-peer (P2P) networking.
C) cloud computing.
D) a distributed network.
Correct Answer
verified
Multiple Choice
A) if the appropriating site has nothing to do with the meta tag.
B) if the two sites appear in the same search engine results.
C) if the use constitutes trademark infringement.
D) under no circumstances.Fact Pattern 5-1 Sound Financials Corporation sends daily e-mail ads to its previous customers and those who have opted to receive the notices.Instable Investments, Inc., sends e-mail ads to any e-mail address that Instable can find on the Web or otherwise generate.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) prohibit or regulates the use of spam.
B) require the use of spam by business entities.
C) ban the use of spam altogether.
D) preempt the application of state law to commercial e-mail.
Correct Answer
verified
Multiple Choice
A) cybersquatting.
B) typosquatting.
C) trademark infringement.
D) trademark dilution.
Correct Answer
verified
Showing 41 - 60 of 72
Related Exams