QuickHelper

(10)

$20/per page/

About QuickHelper

Levels Tought:
Elementary,High School,College,University,PHD

Expertise:
Accounting,Applied Sciences See all
Accounting,Applied Sciences,Business & Finance,Chemistry,Engineering,Health & Medical Hide all
Teaching Since: May 2017
Last Sign in: 352 Weeks Ago, 6 Days Ago
Questions Answered: 20103
Tutorials Posted: 20155

Education

  • MBA, PHD
    Phoniex
    Jul-2007 - Jun-2012

Experience

  • Corportae Manager
    ChevronTexaco Corporation
    Feb-2009 - Nov-2016

Category > Law Posted 23 Sep 2017 My Price 8.00

Exercise 1 1. Crimes against persons using the computer include

Exercise 1

1.      Crimes against persons using the computer include:

 

A.

Bribery, extortion & homicide

 

B.

Hate crimes, fraud & larceny

 

C.

Cyberstalking, fraud & spamming

 

D.

Fraud, embezzlement & perjury

2.      Computer-related crimes can generally be broken down into the following categories.

 

A.

object, subject or instrument

 

B.

object, instrument or theft

 

C.

Instrument, subject or privacy

 

D.

subject, privacy or terrorism

3.     When the government and industry share responsibility in setting goals, developing rules and enforcing standards, this is called…………………….?

4.      Match each term or word with the best answer.

Conspiracy

D

the intent to commit murder

Invasion of Privacy

E

Xerox

Fair Use

F

Sally is speeding and gets into a car accident and gets sued

Tort

G

interference with contractual relations

Economic Tort

H

voluntary act

Public Domain

I

Frank and Joe agree to commit a crime

Men Rea

J

Beth hacks into Fred's computer to install a dangerous virus

Actus reus

K

First Amendment

Trade Name

L

confidential

Computer trespass

M

copyright notice

Defense in internet tort case

N

collecting information about communications in cyberspace

Injunction

O

the court ordered Mary to stop using Bob's copyrighted material

Data mining

 

 

5.      In United States v. Warshak, the court found portions of the "Stored Communications Act" unconstitutional, and that the agents violated the defendant's Fourth Amendment rights.  Why did the court not exclude or suppress the evidence?

 

A.

Because the government has overwhelming evidence

 

B.

Because the government acted in good faith

 

C.

Because the court didn't fully appreciate the issues

 

D.

Because the subject of the emails were for an unprotected area of the law

6.      In Gonzales v. Google, Inc., the court raised on its own without being raised by either party the issue of ______________.

 

A.

Relevance

 

B.

Protective order

 

C.

Undue burden

 

D.

Privacy

7.      The main problems associated with an online privacy policies are:

 

A.

notice & consent

 

B.

security

 

C.

access

 

D.

all of the above

8.      The elements of a crime involve all of the following except:

 

A.

A harm created or a bad result

 

B.

Act or omission

 

C.

Mens rea and actus reus

 

D.

The law must provide punishment

9.      Congress responded to acts of bad faith by people trying to profit from the goodwill of a domain trademark belonging to someone else by passing the __________________.

 

A.

Uniform Electronic Transaction Act

 

B.

Computer Fraud and Abuse Act

 

C.

Digital Millennium Trademark Act

 

D.

Anticybersquatting Consumer Protection Act

10.  When courts look to determine if there has been a violation of the Fair Use of copyrighted materials, they look at: 

 

A.

the economic effect on the one using the materials

 

B.

the type of copyrighted material, noting, that if its in written form, then it is always Fair Use 

 

C.

the proportion of the total work that is used

 

D.

If there was good or bad faith by the user

11.  The Lanham Act governs the law of __________________.

 

A.

Copyrights

 

B.

Trademarks

 

C.

Patents

 

D.

Criminal acts

12.  Holders of a valid copyright can prevent others from doing all of the following, except:

 

A.

passing out their work

 

B.

copying their work and putting it in to a book

 

C.

writing a review of their work and using some of the passages 

 

D.

creating new works based on the original

13.  If a defendant moves to suppress the evidence against him in a criminal case (exclusionary rule), he is saying __________.

 

A.

that the government violated his constitutional rights.

 

B.

that someone, not necessarily the government violated his constitutional rights.

 

C.

none of the above.

 

D.

both A & B above.

14.  If I wanted to stop someone from making unauthorized copies by means of DVDs, I would invoke the Digital Millennium Copyright Act.

True

False

15.  If I commit a tort against my Cyberlaw class, I am called a………………..

16.  In Boring v. Google, Inc., the court found that Google did not invade the privacy of the plaintiffs by there use of an online map because ______________.

 

A.

they didn't show intentional intrusion

 

B.

it wasn't a matter that needed to be kept private

 

C.

it was not highly offensive

 

D.

the house was in a private place

17.  In order to pass their course in Cyberlaw, two students agree to hack into WU's computer to change their grades.  They discuss changing their grades from a F to an A, and they buy the tools necessary to break-in to the WU's administrative offices.  This is an example of a ______________.

 

A.

solicitation

 

B.

false pretenses

 

C.

conspiracy

 

D.

perjury

18.  In order to get a valid patent on an invention, the innovation must be:

 

A.

sufficiently inventive, materially successful and novel

 

B.

sufficiently inventive, novel and sought after

 

C.

novel and materially successful

 

D.

sufficiently inventive, novel and have industrial application

 

 

 

Answers

(10)
Status NEW Posted 23 Sep 2017 07:09 PM My Price 8.00

Hel-----------lo -----------Sir-----------/Ma-----------dam----------- T-----------han-----------k Y-----------ou -----------for----------- us-----------ing----------- ou-----------r w-----------ebs-----------ite----------- an-----------d a-----------cqu-----------isi-----------tio-----------n o-----------f m-----------y p-----------ost-----------ed -----------sol-----------uti-----------on.----------- Pl-----------eas-----------e p-----------ing----------- me----------- on----------- ch-----------at -----------I a-----------m o-----------nli-----------ne -----------or -----------inb-----------ox -----------me -----------a m-----------ess-----------age----------- I -----------wil-----------l

Not Rated(0)