Business Law

profilemikpau
Question 1 of 20
5.0 Points
A person who gains unauthorized access to computers, either for mischief or with criminal intent, is called a(n):
A. imposter. 
B. fraud. 
C. genius. 
D. hacker. 
Reset Selection

Question 2 of 20
5.0 Points
Instructions hidden in software with the potential to cause significant damage to both hardware and software is a:
A. virus. 
B. piracy. 
C. corruption. 
D. façade. 
Reset Selection

Question 3 of 20
5.0 Points
The Electronic Communications Privacy Act (ECPA) states that individuals may not gain access without permission to a(n):
A. fund transfer system. 
B. cyberspace privacy system. 
C. electronic communication system. 
D. antiviral organization. 
Reset Selection

Question 4 of 20
5.0 Points
The rapid advances in technology being experienced today make it difficult for people to maintain online anonymity or distance between themselves and powerful:
A. sales. 
B. interests. 
C. forces. 
D. departments. 
Reset Selection

Question 5 of 20
5.0 Points
Online marketers of products and services have quickly recognized that learning about consumers' online behavior presents a real opportunity to increase their:
A. sales. 
B. interests. 
C. forces. 
D. departments. 
Reset Selection

Question 6 of 20
5.0 Points
Trademark registrations are issued at the federal level by the U.S. Patent and Trademark Office of the Department of:
A. Commerce. 
B. Labor. 
C. Justice. 
D. States. 
Reset Selection

Question 7 of 20
5.0 Points
A trademark registration is issued for a renewable period of __________ years.
A. 10 
B. 20 
C. 50 
D. 60 
Reset Selection

Question 8 of 20
5.0 Points
A distinctive, nonfunctional feature, which distinguishes a merchant's or manufacturer's goods or services from those of another, is known as a:
A. trademark. 
B. trade dress. 
C. design patent. 
D. copyright. 
Reset Selection

Question 9 of 20
5.0 Points
Anyone who manufactures or sells, without permission, a product that has been patented by another can be charged with:
A. fraud. 
B. infringement. 
C. misrepresentation. 
D. breach of contract. 
Reset Selection

Question 10 of 20
5.0 Points
The Patent and Trademark Office would probably grant a patent if the invention is a device, useful, novel, and:
A. unauthorized. 
B. obsolete. 
C. nonobvious. 
D. general. 
Reset Selection

Question 11 of 20
5.0 Points
Design patents are granted for a period __________ years.
A. less than 20 
B. from 20 to 30 
C. from 30 to 40 
D. from 40 to 50 
Reset Selection

Question 12 of 20
5.0 Points
A place where a corporation or an issuer sells its securities to the public is known as a __________ market.
A. commodity 
B. primary 
C. secondary 
D. labor 
Reset Selection

Question 13 of 20
5.0 Points
Issuers of securities must register the securities with the:
A. U.S. Copyright Commission. 
B. U.S. Patent and Trademark Office. 
C. Securities and Exchange Commission. 
D. Federal Trade Commission. 
Reset Selection

Question 14 of 20
5.0 Points
A document that provides relevant and important information about the company, its businesses, and its prospects is known as:
A. memorandum of association. 
B. articles of association. 
C. letters of incorporation. 
D. prospectus. 
Reset Selection

Question 15 of 20
5.0 Points
In 1992, the SEC created a computerized system, known as the Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system that allows companies to:
A. download required information directly. 
B. sell its shares to the public online. 
C. make advertisements on the web. 
D. register with the Federal Trade Commission. 
Reset Selection

Question 16 of 20
5.0 Points
A computer program is defined as a "set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain act" under the:
A. Global Computer Review Act of 2004. 
B. Computer Software Copyright Act of 1980. 
C. National Software Act of 1863. 
D. USA Computer Act of 2001. 
Reset Selection

Question 17 of 20
5.0 Points
A(n) __________ test is used to determine whether an ordinary reasonable observer comparing two works would have to conclude that the work being questioned was copied from the other.
A. substantial similarity 
B. fair use 
C. goodwill 
D. infringement 
Reset Selection

Question 18 of 20
5.0 Points
A form of personal property, which includes knowledge, ways of doing things, and expressions of ideas is known as a(n):
A. intellectual property. 
B. tangible property. 
C. real property. 
D. easementary right. 
Reset Selection

Question 19 of 20
5.0 Points
Consumers who believe that their right to privacy is being violated by the embedding of software can complain to the:
A. Federal Tort Curbing Agency. 
B. Administration and Trade Commission. 
C. Agency against Unfair Trade Practices. 
D. Federal Trade Commission. 
Reset Selection

Question 20 of 20
5.0 Points
The ECPA also grants an Internet service provider (ISP) the right to __________ e-mail messages without the subscriber's consent.
A. monitor 
B. screen 
C. block 
D. redirect 
Reset Selection
    • 9 years ago
    • 5
    Answer(3)

    Purchase the answer to view it

    blurred-text
    NOT RATED

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      law.odt

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      business_law.docx
    Bids(1)