Page contents

The Legal Environment Today Summarized Case Edition Business in its Ethical, Regulatory E-Commerce, And Global Setting 8th Edition by Roger LeRoy Miller – Test Bank

Instant delivery only

In Stock

$28.00

Add to Wishlist
Add to Wishlist
Compare
SKU:tb1001224

The Legal Environment Today Summarized Case Edition Business in its Ethical, Regulatory E-Commerce, And Global Setting 8th Edition by Roger LeRoy Miller – Test Bank

Legal Environment Today, 8th Edition – Miller/Cross  All Rights Reserved – Cengage Learning©

True / False

1. In some states, an unsolicited e-mail must include a toll-free phone number that the recipient can use to ask the sender to send no more unsolicited e-mail.

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

Introduction

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

2. Federal law permits the sending of unsolicited commercial e-mail and does not prohibit spamming activities.

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

Introduction

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

3. In an attempt to combat spam, thirty-six states have enacted laws that prohibit or regulate its use​

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

Introduction

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

4. Cybersquatting is illegal only if a domain name is identical to the trademark of another, not if the name is merely confusingly similar.

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

LO-1

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

5. Cybersquatting occurs when key words are inserted into the hyper text markup language code to tell Internet browsers specific information about a Web page.

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

LO-1

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

6. When you download an application on your smartphone, you are typically entering into a license agreement.

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

LO-1

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG: Reflective

KEYWORDS:

Bloom’s: Knowledge

7. Using a domain name that is an identical or similar to the trademark of another is legal.​

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

LO-1

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

8. The Anticybersquatting Consumer Protection Act applies to most, but not all, domain name registrations of trademarks.​

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

LO-1

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

9. Federal law prohibits the Federal Trade Commission from cooperating and sharing information with foreign agencies in investigating and prosecuting those involved in spamming.​

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

LO-1

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

10. Using another’s trademark in a meta tag does not normally constitute trademark infringement, even if it is done without the owner’s permission.​

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

LO-1

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

11. A claim of trademark dilution requires proof that consumers are likely to be confused by a connection between the unauthorized use and the mark.​

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

LO-1

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

12. A licensor might grant a license allowing a trademark to be used as part of a domain name.​

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

LO-1

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

13. Much of the material on the Internet, including software and database information, is not copyrighted.

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Copyrights in Digital Information

LEARNING OBJECTIVES:

LO-2 – LO – 2

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

14. The law does not restrict the “fair use” of methods for the circumvention of encryption software or other technological antipiracy protection for educational and other noncommercial purposes.

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Copyrights in Digital Information

LEARNING OBJECTIVES:

LO-2 – LO – 2

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

15. No federal court has held that digitally sampling a copyrighted sound recording of any length constitutes copyright infringement.

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Copyrights in Digital Information

LEARNING OBJECTIVES:

LO-2 – LO – 2

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

16. Downloading music into a computer’s random access memory, or RAM, is not copyright infringement, even if it is done without authorization.​

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Copyrights in DIgital Information

LEARNING OBJECTIVES:

LO-2 – LO – 2

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

17. Penalties exist for anyone who circumvents encryption software or other technological antipiracy protection.​

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Copyrights in DIgital Information

LEARNING OBJECTIVES:

LO-2 – LO – 2

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

18. The manufacture, import, sale, and distribution of devices or services for the circumvention of encryption software is prohibited.​

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Copyrights in Digital Information

LEARNING OBJECTIVES:

LO-2 – LO – 2

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

19. An Internet service provider is liable for any act of copyright infringement by its customer.​

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Copyrights in Digital Information

LEARNING OBJECTIVES:

LO-2 – LO – 2

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

20. A company can distribute file-sharing software with the object of promoting its use to infringe copyrights without liability for the resulting acts of infringement by its users.​

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Copyrights in DIgital Information

LEARNING OBJECTIVES:

LO-2 – LO – 2

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

21. Federal wiretapping law covers electronic forms of communication.

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Social Media

LEARNING OBJECTIVES:

LO-3 – explain reasons and ways organizations may pursue diversity and inclusion even in the absence of legislation.

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

22. Federal law permits the intentional interception of any wire, oral, or electronic communication.

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Social Media

LEARNING OBJECTIVES:

LO-3 – explain reasons and ways organizations may pursue diversity and inclusion even in the absence of legislation.

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

23. Federal law permits the intentional accessing of stored electronic communication even if the accessing is unauthorized.

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Social Media

LEARNING OBJECTIVES:

LO-3 – explain reasons and ways organizations may pursue diversity and inclusion even in the absence of legislation.

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

24. Law enforcement uses social media to detect and prosecute criminals.

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Social Media

LEARNING OBJECTIVES:

LO-3 – explain reasons and ways organizations may pursue diversity and inclusion even in the absence of legislation.

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

25. Social media posts are routinely included in discovery in litigation.

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Social Media

LEARNING OBJECTIVES:

LO-3 – explain reasons and ways organizations may pursue diversity and inclusion even in the absence of legislation.

NATIONAL STANDARDS:

United States – AICPA: BB-Critical Thinking
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

26. Social media users can post trademarked images or copyrights materials without infringing the owners’ rights, even if it is done without permission.​

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Social Media

LEARNING OBJECTIVES:

LO-3 – explain reasons and ways organizations may pursue diversity and inclusion even in the absence of legislation.

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

27. Social media posts have no uses in litigation.​

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Social Media

LEARNING OBJECTIVES:

LO-3 – explain reasons and ways organizations may pursue diversity and inclusion even in the absence of legislation.

NATIONAL STANDARDS:

United States – AICPA: BB-Critical Thinking
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

28. An employer may have a right to terminate a person based on his or her violation of the employer’s social media policy.​

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Social Media

LEARNING OBJECTIVES:

LO-3 – explain reasons and ways organizations may pursue diversity and inclusion even in the absence of legislation.

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

29. Employees’ posts on social media may be protected under labor laws.​

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Social Media

LEARNING OBJECTIVES:

LO-3 – explain reasons and ways organizations may pursue diversity and inclusion even in the absence of legislation.

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

30. Employers cannot monitor employees’ electronic communications made in the ordinary course of business.​

a.

True

b.

False

ANSWER:

False

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Social Media

LEARNING OBJECTIVES:

LO-3 – explain reasons and ways organizations may pursue diversity and inclusion even in the absence of legislation.

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

31. Federal law prevents a provider of communication services—such as a cell phone company—from divulging private communications to certain entities and individuals.​

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Social Media

LEARNING OBJECTIVES:

LO-3 – explain reasons and ways organizations may pursue diversity and inclusion even in the absence of legislation.

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

32. ​ Cyber torts are torts that arise from online conduct.

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Online Defamation

LEARNING OBJECTIVES:

LO-4

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

33. Online defamation is wrongfully hurting a person’s reputation by communicating false statements about that person to others online.

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Online Defamation

LEARNING OBJECTIVES:

LO-4

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

34. It is frequently the companies rather than courts or legislatures that are defining the privacy rights of their online users.

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Privacy

LEARNING OBJECTIVES:

LO – 5

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

35. To maintain a suit for the invasion of privacy, a person must have a reasonable expectation of privacy in the particular situation.​

a.

True

b.

False

ANSWER:

True

POINTS:

1

DIFFICULTY:

Easy

REFERENCES:

Privacy

LEARNING OBJECTIVES:

LO-5

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG – Analytic – BUSPROG: Analytic

KEYWORDS:

Bloom’s: Knowledge

Multiple Choice

36. ConnectWeb, Inc., an Internet service provider (ISP), supplies information to the Federal Trade Commission concerning possible unfair or deceptive conduct in foreign jurisdictions. For this disclosure, federal law gives ConnectWeb and other ISPs immunity from liability. This is

a.

goodwill.

b.

fair use.

c.

a safe harbor.

d.

a license.

ANSWER:

c

POINTS:

1

DIFFICULTY:

Moderate

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

Introduction

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG: Reflective

KEYWORDS:

Bloom’s: Application

Fact Pattern 15-2

Sound Financials Corporation sends daily e-mail ads to its previous customers and those who have opted to receive the notices. Instable Investments, Inc., sends e-mail ads to any e-mail address that Instable can find on the Web or otherwise generate.​

37. Refer to Fact Pattern 15-2. In those states with antispam laws, federal law​

a.

​ prohibits or regulates the use of spam.

b.

​ requires the use of spam by business entities.

c.

​ bans the use of spam altogether.

d.

​ preempts the application of state law to commercial e-mail with certain exceptions.

ANSWER:

d

POINTS:

1

DIFFICULTY:

Moderate

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

Introduction

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG: Reflective

KEYWORDS:

Bloom’s: Application

38. Refer to Fact Pattern 15–2. One of the advertisers—either Sound Financials or Instable Investments—is acting within the bounds of federal law. Federal law permits the sending of​

a.

​ unsolicited commercial e-mail.

b.

​ solicited commercial e-mail only.

c.

​ commercial e-mail to randomly generated addresses.

d.

​ commercial e-mail to addresses “harvested” from Web sites through the use of specialized software.

ANSWER:

a

POINTS:

1

DIFFICULTY:

Moderate

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

Introduction

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG: Reflective

KEYWORDS:

Bloom’s: Application

39. Refer to Fact Pattern 15-2. Sound Financials and Instable Investments are subject to the laws of the states in which they are located and do business. Thirty-six states​

a.

​ prohibit or regulates the use of spam.

b.

​ require the use of spam by business entities.

c.

​ ban the use of spam altogether.

d.

​ preempt the application of state law to commercial e-mail.

ANSWER:

a

POINTS:

1

DIFFICULTY:

Moderate

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

Introduction

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG: Reflective

KEYWORDS:

Bloom’s: Application

Fact Pattern 15-1

CallTalk Corporation, a smartphone and phone-time seller, chooses to use and register “calltalk” as its second-level domain. Later, CallTalk’s less successful competitor, CellTalk Company, chooses to use and register “caltalk” (an intentional misspelling of “calltalk”) as its second-level domain. Still later, Call&Talk, Inc., uses the domain name “callltalk” (also a deliberate misspelling of “calltalk”) without CallTalk’s authorization, to sell pornographic phone conversations.

40. Refer to Fact Pattern 15-1. By using a similar domain name to CallTalk’s, CellTalk is most likely attempting to profit from its competitor’s

a.

goodwill.

b.

fair use.

c.

license.

d.

safe harbor.

ANSWER:

a

POINTS:

1

DIFFICULTY:

Moderate

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

LO-1

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG: Reflective

KEYWORDS:

Bloom’s: Application

41. Refer to Fact Pattern 15-1. CallTalk wants to sue Call&Talk for its unauthorized use of the domain name “callltalk.” Before bringing the suit, CallTalk has to ask the court for a subpoena to discover

a.

the true identity of the owner of the unauthorized site.

b.

the amount of the profits of the unauthorized site.

c.

the estimated costs of the court proceedings and discovery.

d.

all of the registered variations of the name “calltalk.”

ANSWER:

a

POINTS:

1

DIFFICULTY:

Moderate

REFERENCES:

Internet Law

LEARNING OBJECTIVES:

LO-1

NATIONAL STANDARDS:

United States – AICPA: BB-Legal
United States – BUSPROG: Reflective

KEYWORDS:

Bloom’s: Application

Reviews

There are no reviews yet.

Write a review

Your email address will not be published. Required fields are marked *

Product has been added to your cart