Business Law Chapter 19 Study Guide

advertisement
Name:
Business Law Chapter 19 Study Guide
True/False
Indicate whether the statement is true or false.
1. Cyberlaw merges concepts and doctrines from many legal fields and puts
them in the context of computers.
2. An illegal activity already in the criminal code committed by using a
computer is called cyberspoofing.
3. The Digital Millennium Copyright Act makes it legal to copy computer
programs that were previously copyrighted.
4. Computer users who spend time in chat rooms are very vulnerable to
cyberpiracy.
5. Identity thieves often target your credit card account, and it can take years
to fix the problem once they have stolen your identity.
6. When cybervandalism is done as a prank, it is not considered a crime.
7. The two most common types of cybertorts are cyberdefamation and
cyberinvasion of privacy.
8. The Communications Decency Act protects Internet providers from being
held liable for any cyberdefamation performed by users of their services.
9. Your employer can monitor the e-mail you send from your computer at
work if you consent.
10. Once Congress passed the E-sign Act, digital signatures were considered
legal.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
11. The No Electronic Theft Act of 1997 provides prison terms and fines for
anyone who
a. steals someone’s debit card and uses it.
b. uses a piece of copyrighted software before it is sold to the public.
c. creates an electronic duplicate of a copyrighted work for profit.
d. uses someone else’s digital signature.
12. A domain name is the
a. server where a Web site is
located.
b. trademark used on a business
Web site.
c. copyrighted name of a business.
d. Internet address of a business.
13. The Uniform Computer Information Transactions Act
a. allows duplicate domain names as long as the business is in a
different state.
b. protects the patents of software programmers.
c. requires government agencies to use the same computer system.
d. governs the law for cybercontracts.
14. Cyberspoofing is a crime in which a person
a. creates a virus to disrupt someone else’s computer network.
b. commits cyberextortion or blackmail.
c. falsely adopts the identity of someone else in order to commit
fraud.
d. uses a computer to steal data stored in digital format.
15. Firewalls and anti-virus software are specifically designed to protect your
computer from acts of
a. cybergerm warfare.
c. cyberterrorism.
b. cybertorts.
d. identity theft.
16. The Electronic Communications Privacy Act
a. protects your medical records from being transmitted electronically.
b. restricts the unauthorized access of e-mail and instant messaging.
c. protects your banking and other financial records from
unauthorized users.
d. prevents the use of an electronic device that can falsely damage a
person’s reputation.
17. A legal protection for literary, artistic, and scientific works is called a
a. domain.
c. patent.
b. copyright.
d. trademark.
18. A distinctive name, word, symbol, image, or slogan used by a business for
identity purposes is called a
a. domain name.
b. patent.
c. trademark.
d. copyright.
19. Cybercontract law deals with
a. jurisdictional issues related to e-commerce.
b. digital music and videos broadcast online.
c. contracts that are printed from a computer.
d. the buying and selling of computers and computer programs.
20. If someone creates a phony Web site that simulates a real bank and sends
false e-mails, it is called
a. cyberblackmail.
c. cyberspoofing.
b. cyberphishing.
d. cyberpiracy.
Completion
Complete each statement.
21. ____________________ is using a computer to steal someone’s financial,
educational, or other personal data.
22. When someone disrupts the nation’s ____________________ by using a
computer, it is called cyberterrorism.
23. ____________________ makes Internet transactions secure by encoding
the data in such a way that only authorized persons can read it.
24. A copyright extends for the creator’s life plus ____________________
years.
25. A(n) ____________________ is someone who registers a trade name as a
domain name with no intent to use it. Instead, he or she asks for a large
sum of money to sell the name back to the real owner.
26. The Uniform Computer Information Transactions Act governs the law for
____________________, including software agreements and maintenance
contracts.
27. ____________________ might destroy a business’s Web site as an act of
revenge.
28. The invasion or theft of data stored in a computer for the purpose of
committing a tort is called a(n) ____________________.
29. Internet sellers who do not have a store or office in a particular state
cannot be ____________________ by that state.
Matching
Match each term with its definition.
a. cyberlaw
f.
b. cybercrime
g.
c. cybertrespass
h.
d. cyberspoofing
i.
e. cyberpiracy
j.
cyberblackmail
cyberdefamation
cybervandalism
cybertort
cyberinvasion of privacy
30. Phishing is an example of this type of crime
31. Often involve employees who work closely with confidential files
32. Damaging or destroying a Web site or computer network
33. The area of law connected to computers and computer-related crimes
34. Sometimes called cyberextortion
35. Congress passed the Digital Millennium Copyright Act to combat this
type of crime
36. Any criminal activity associated with a computer
37. May involve sending out e-mails that contain false information about a
company
38. The invasion, theft, falsification, or misuse of data stored in a computer to
commit a tort
39. Any illegal activity already in the criminal code committed by using a
computer
Short Answer
40. Which of the computer laws that you studied in Chapter 19 do you think
is the most important? Explain why.
Business Law Chapter 19 Study Guide
True/False
Indicate whether the statement is true or false.
1. Cyberlaw merges concepts and doctrines from many legal fields and puts
them in the context of computers.
2. An illegal activity already in the criminal code committed by using a
computer is called cyberspoofing.
3. The Digital Millennium Copyright Act makes it legal to copy computer
programs that were previously copyrighted.
4. Computer users who spend time in chat rooms are very vulnerable to
cyberpiracy.
5. Identity thieves often target your credit card account, and it can take years
to fix the problem once they have stolen your identity.
6. When cybervandalism is done as a prank, it is not considered a crime.
7. The two most common types of cybertorts are cyberdefamation and
cyberinvasion of privacy.
8. The Communications Decency Act protects Internet providers from being
held liable for any cyberdefamation performed by users of their services.
9. Your employer can monitor the e-mail you send from your computer at
work if you consent.
10. Once Congress passed the E-sign Act, digital signatures were considered
legal.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
11. The No Electronic Theft Act of 1997 provides prison terms and fines for
anyone who
a. steals someone’s debit card and uses it.
b. uses a piece of copyrighted software before it is sold to the public.
c. creates an electronic duplicate of a copyrighted work for profit.
d. uses someone else’s digital signature.
12. A domain name is the
a. server where a Web site is
located.
b. trademark used on a business
Web site.
c. copyrighted name of a business.
d. Internet address of a business.
13. The Uniform Computer Information Transactions Act
a. allows duplicate domain names as long as the business is in a
different state.
b. protects the patents of software programmers.
c. requires government agencies to use the same computer system.
d. governs the law for cybercontracts.
14. Cyberspoofing is a crime in which a person
a. creates a virus to disrupt someone else’s computer network.
b. commits cyberextortion or blackmail.
c. falsely adopts the identity of someone else in order to commit
fraud.
d. uses a computer to steal data stored in digital format.
15. Firewalls and anti-virus software are specifically designed to protect your
computer from acts of
a. cybergerm warfare.
b. cybertorts.
c. cyberterrorism.
d. identity theft.
16. The Electronic Communications Privacy Act
a. protects your medical records from being transmitted electronically.
b. restricts the unauthorized access of e-mail and instant messaging.
c. protects your banking and other financial records from
unauthorized users.
d. prevents the use of an electronic device that can falsely damage a
person’s reputation.
17. A legal protection for literary, artistic, and scientific works is called a
a. domain.
c. patent.
b. copyright.
d. trademark.
18. A distinctive name, word, symbol, image, or slogan used by a business for
identity purposes is called a
a. domain name.
c. trademark.
b. patent.
d. copyright.
19. Cybercontract law deals with
a. jurisdictional issues related to e-commerce.
b. digital music and videos broadcast online.
c. contracts that are printed from a computer.
d. the buying and selling of computers and computer programs.
20. If someone creates a phony Web site that simulates a real bank and sends
false e-mails, it is called
a. cyberblackmail.
c. cyberspoofing.
b. cyberphishing.
d. cyberpiracy.
Completion
Complete each statement.
21. ____________________ is using a computer to steal someone’s financial,
educational, or other personal data.
22. When someone disrupts the nation’s ____________________ by using a
computer, it is called cyberterrorism.
23. ____________________ makes Internet transactions secure by encoding
the data in such a way that only authorized persons can read it.
24. A copyright extends for the creator’s life plus ____________________
years.
25. A(n) ____________________ is someone who registers a trade name as a
domain name with no intent to use it. Instead, he or she asks for a large
sum of money to sell the name back to the real owner.
26. The Uniform Computer Information Transactions Act governs the law for
____________________, including software agreements and maintenance
contracts.
27. ____________________ might destroy a business’s Web site as an act of
revenge.
28. The invasion or theft of data stored in a computer for the purpose of
committing a tort is called a(n) ____________________.
29. Internet sellers who do not have a store or office in a particular state
cannot be ____________________ by that state.
Matching
Match each term with its definition.
a. cyberlaw
f. cyberblackmail
b. cybercrime
g. cyberdefamation
c. cybertrespass
d. cyberspoofing
e. cyberpiracy
h. cybervandalism
i. cybertort
j. cyberinvasion of privacy
30. Phishing is an example of this type of crime
31. Often involve employees who work closely with confidential files
32. Damaging or destroying a Web site or computer network
33. The area of law connected to computers and computer-related crimes
34. Sometimes called cyberextortion
35. Congress passed the Digital Millennium Copyright Act to combat this
type of crime
36. Any criminal activity associated with a computer
37. May involve sending out e-mails that contain false information about a
company
38. The invasion, theft, falsification, or misuse of data stored in a computer to
commit a tort
39. Any illegal activity already in the criminal code committed by using a
computer
Short Answer
40. Which of the computer laws that you studied in Chapter 19 do you think
is the most important? Explain why.
Related documents
Download