The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 352 Weeks Ago, 6 Days Ago |
| Questions Answered: | 20103 |
| Tutorials Posted: | 20155 |
MBA, PHD
Phoniex
Jul-2007 - Jun-2012
Corportae Manager
ChevronTexaco Corporation
Feb-2009 - Nov-2016
Exercise 1
1.     Crimes against persons using the computer include:
| Â |
A. |
Bribery, extortion & homicide |
| Â |
B. |
Hate crimes, fraud & larceny |
| Â |
C. |
Cyberstalking, fraud & spamming |
| Â |
D. |
Fraud, embezzlement & perjury |
2.     Computer-related crimes can generally be broken down into the following categories.
| Â |
A. |
object, subject or instrument |
| Â |
B. |
object, instrument or theft |
| Â |
C. |
Instrument, subject or privacy |
| Â |
D. |
subject, privacy or terrorism |
3.    When the government and industry share responsibility in setting goals, developing rules and enforcing standards, this is called…………………….?
4.     Match each term or word with the best answer.
|
Conspiracy |
D |
the intent to commit murder |
|
Invasion of Privacy |
E |
Xerox |
|
Fair Use |
F |
Sally is speeding and gets into a car accident and gets sued |
|
Tort |
G |
interference with contractual relations |
|
Economic Tort |
H |
voluntary act |
|
Public Domain |
I |
Frank and Joe agree to commit a crime |
|
Men Rea |
J |
Beth hacks into Fred's computer to install a dangerous virus |
|
Actus reus |
K |
First Amendment |
|
Trade Name |
L |
confidential |
|
Computer trespass |
M |
copyright notice |
|
Defense in internet tort case |
N |
collecting information about communications in cyberspace |
|
Injunction |
O |
the court ordered Mary to stop using Bob's copyrighted material |
|
Data mining |
 |
 |
5.     In United States v. Warshak, the court found portions of the "Stored Communications Act" unconstitutional, and that the agents violated the defendant's Fourth Amendment rights. Why did the court not exclude or suppress the evidence?
| Â |
A. |
Because the government has overwhelming evidence |
| Â |
B. |
Because the government acted in good faith |
| Â |
C. |
Because the court didn't fully appreciate the issues |
| Â |
D. |
Because the subject of the emails were for an unprotected area of the law |
6.     In Gonzales v. Google, Inc., the court raised on its own without being raised by either party the issue of ______________.
| Â |
A. |
Relevance |
| Â |
B. |
Protective order |
| Â |
C. |
Undue burden |
| Â |
D. |
Privacy |
7.     The main problems associated with an online privacy policies are:
| Â |
A. |
notice & consent |
| Â |
B. |
security |
| Â |
C. |
access |
| Â |
D. |
all of the above |
8.     The elements of a crime involve all of the following except:
| Â |
A. |
A harm created or a bad result |
| Â |
B. |
Act or omission |
| Â |
C. |
Mens rea and actus reus |
| Â |
D. |
The law must provide punishment |
9.     Congress responded to acts of bad faith by people trying to profit from the goodwill of a domain trademark belonging to someone else by passing the __________________.
| Â |
A. |
Uniform Electronic Transaction Act |
| Â |
B. |
Computer Fraud and Abuse Act |
| Â |
C. |
Digital Millennium Trademark Act |
| Â |
D. |
Anticybersquatting Consumer Protection Act |
10. When courts look to determine if there has been a violation of the Fair Use of copyrighted materials, they look at:Â
| Â |
A. |
the economic effect on the one using the materials |
| Â |
B. |
the type of copyrighted material, noting, that if its in written form, then it is always Fair Use |
| Â |
C. |
the proportion of the total work that is used |
| Â |
D. |
If there was good or bad faith by the user |
11. The Lanham Act governs the law of __________________.
| Â |
A. |
Copyrights |
| Â |
B. |
Trademarks |
| Â |
C. |
Patents |
| Â |
D. |
Criminal acts |
12. Holders of a valid copyright can prevent others from doing all of the following, except:
| Â |
A. |
passing out their work |
| Â |
B. |
copying their work and putting it in to a book |
| Â |
C. |
writing a review of their work and using some of the passages |
| Â |
D. |
creating new works based on the original |
13. If a defendant moves to suppress the evidence against him in a criminal case (exclusionary rule), he is saying __________.
| Â |
A. |
that the government violated his constitutional rights. |
| Â |
B. |
that someone, not necessarily the government violated his constitutional rights. |
| Â |
C. |
none of the above. |
| Â |
D. |
both A & B above. |
14. If I wanted to stop someone from making unauthorized copies by means of DVDs, I would invoke the Digital Millennium Copyright Act.
True
False
15. If I commit a tort against my Cyberlaw class, I am called a………………..
16. In Boring v. Google, Inc., the court found that Google did not invade the privacy of the plaintiffs by there use of an online map because ______________.
| Â |
A. |
they didn't show intentional intrusion |
| Â |
B. |
it wasn't a matter that needed to be kept private |
| Â |
C. |
it was not highly offensive |
| Â |
D. |
the house was in a private place |
17. In order to pass their course in Cyberlaw, two students agree to hack into WU's computer to change their grades. They discuss changing their grades from a F to an A, and they buy the tools necessary to break-in to the WU's administrative offices. This is an example of a ______________.
| Â |
A. |
solicitation |
| Â |
B. |
false pretenses |
| Â |
C. |
conspiracy |
| Â |
D. |
perjury |
18. In order to get a valid patent on an invention, the innovation must be:
| Â |
A. |
sufficiently inventive, materially successful and novel |
| Â |
B. |
sufficiently inventive, novel and sought after |
| Â |
C. |
novel and materially successful |
| Â |
D. |
sufficiently inventive, novel and have industrial application |
Â
Â
Â
Hel-----------lo -----------Sir-----------/Ma-----------dam----------- T-----------han-----------k Y-----------ou -----------for----------- us-----------ing----------- ou-----------r w-----------ebs-----------ite----------- an-----------d a-----------cqu-----------isi-----------tio-----------n o-----------f m-----------y p-----------ost-----------ed -----------sol-----------uti-----------on.----------- Pl-----------eas-----------e p-----------ing----------- me----------- on----------- ch-----------at -----------I a-----------m o-----------nli-----------ne -----------or -----------inb-----------ox -----------me -----------a m-----------ess-----------age----------- I -----------wil-----------l