Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Law
Q:
Because relativism emphasizes the highly individualized nature of ethical decision making, it is also called subjective ethics.
Q:
Natural law theory holds that right and wrong are measured by the obligations imposed on each individual by an implied agreement among all individuals within a particular social system.
Q:
Law consists of values that govern a society's attitudes toward right and wrong.
Q:
The Communications Decency Act of 1996 violated the _____.
A. Sixth Amendment
B. Eighth Amendment
C. First Amendment
D. Fourth Amendment
Q:
The _____ protects citizens from government restraints on the content of speech, although reasonable restraints on the context (time, place, and manner) of that speech are sometimes constitutionally permissible.
A. Sixth Amendment
B. Eighth Amendment
C. First Amendment
D. Fourth Amendment
Q:
Which of the following federal acts establishes both civil and criminal penalties for violations of its provisions?
A. The CAN-SPAM Act
B. The PROTECT Act
C. The U.S. SAFE WEB Act
D. The Anti-Phishing Act
Q:
Which of the following is charged with enforcing the CAN-SPAM Act?
A. The United States Commercial Service
B. The Federal Trade Commission
C. The United States Department of Commerce
D. The U.S. Securities and Exchange Commission
Q:
In the context of the Internet, what is the reason for the access imbalance that exists in the United States?
A. Availability of service is a problem in the United States.
B. Digital literacy is an issue in the United States.
C. Security concern in the United States is high.
D. About 98 percent of American households are located where broadband is absent.
Q:
If people wish to connect to the Internet, they contract with a commercial Internet service provider and pay a fee for the type and level of service they desire. They then have access to any content provider. This uniform access is referred to as _____.
A. net equality
B. net connectivity
C. net neutrality
D. net activity
Q:
In December 2010, the Federal Communications Commission (FCC) issued new rules on net neutrality to address net neutrality issues. Which of the following statements is true of these rules?
A. Wired broadband services were permitted to block lawful content, applications, services, or non-harmful devices.
B. Wireless broadband services were subject to the same disclosure rules as the wired broadband services but were granted more leeway with regard to equal access.
C. Wired broadband services were permitted to block consumer access to lawful websites that competed with their video telephony services.
D. Wireless broadband services were allowed to withhold information regarding network performance.
Q:
When a country seeks to apply its own laws to foreigners, the question is whether the country has _____.
A. jurisdiction to enforce
B. jurisdiction to prescribe
C. jurisdiction to adjudicate
D. jurisdiction to legislate
Q:
In the international context, _____ refers to judicial personal jurisdiction.
A. jurisdiction to enforce
B. jurisdiction to prescribe
C. jurisdiction to legislate
D. jurisdiction to adjudicate
Q:
The Uniform Computer Information Transactions Act, which governs software and Internet transactions as well as issues associated with software licensure, has now been adopted by a majority of states.
Q:
The Court in Capitol Records v. ReDIGI held that songs bought from Apples iTunes and similar retailers cannot be resold by the original purchaser under the first sale doctrine because the doctrine protects only the owner of a particular copy.
Q:
People and businesses can choose any domain name they want just by telling their Internet service provider that that is how they want to be known.
Q:
Which of the following statements is true of the digital divide in the United States?
A. Although nearly 98 percent of American households are located where broadband is available, 60 percent of American adults are not connected.
B. The percentage of Internet users in certain areas such as California is much lower than some other areas such as Mississippi.
C. Seventy-six percent of white households are connected to the Internet, but only 57 percent of African-American households are connected.
D. Ninety percent of those under 65 use the Internet, but only about 50 percent of those 65 and older use the Internet.
Q:
Which of the following statements is true of the digital divide at the global level?
A. Only 5.6 percent of Africas citizens have access to the Internet, compared with 78.6 percent in North America.
B. Only 24 percent of the population in sub-Saharan Africa has access to the Internet, compared with 80.6 percent in North America.
C. Although nearly 90 percent of households are located where broadband is available, 60 percent of adults are not connected to the Internet.
D. The number of Internet connections is growing by less than 9 percent annually, but just over one-third of the population is connected.
Q:
The United States has a comprehensive privacy law addressing the Internet environment.
Q:
Google and Facebook and other advertising-driven business models sell their users data to pay for the services they give without charge to their users.
Q:
The European Union has negotiated certain safe harbors for U.S. companies not complying with its Data Protection Directive, which allows individuals to decide how their personal information can be used.
Q:
The Council of Europe has proffered the Convention on Cybercrime as an international effort to address computer-facilitated crime.
Q:
Electronic signatures are not legal in the U.S. because Congress failed to pass the Electronic Signatures in Global and National Commerce Act.
Q:
Punishment for violation of the Computer Fraud and Abuse Act of 1986 is limited to fines.
Q:
As per the rules issued by the Federal Communications Commission in December 2010, Internet service providers are allowed to block consumer access to lawful websites and applications that compete with the providers voice or video telephony services.
Q:
Commercial speech has not been accorded any protection under the First Amendment of the U.S. Constitution.
Q:
The Federal Trade Commission has expanded the definition of personal information to include not just names, phone numbers, home and e-mail address, but also mobile phone serial numbers.
Q:
Internet users in the United States pay a fee to Internet service providers for the type and level of service they desire.
Q:
Net neutrality implies that Internet service providers will discriminate against the traffic of legal content providers.
Q:
For wired broadband services, net neutrality rules prohibit blocking of lawful content, applications, services, or non-harmful devices.
Q:
Define the term click-wrap agreements. Identify one problem it might create for consumers.
Q:
Discuss the assignment of Internet domain names.
Q:
Discuss the basic tax issue that arises from cyberspace transactions.
Q:
The drastic increase in the number of people having access to the Internet has been made possible, in part because of the relatively cheap access offered by cell phones in comparison with the cost of computers.
Q:
The Internet is increasing national boundaries.
Q:
The Internet delivers private communications between particular users, much as a phone system.
Q:
Explain in brief a free speech issue in the context of online pornography. Describe the role of the judiciary and the Congress in handling this issue.
Q:
Identify and discuss an ethical issue raised by the global nature of the Internet.
Q:
Describe the European Unions approach to privacy concerns raised by the Internet.
Q:
Lavender, a beauty salon, uses the symbol of a bouquet of lavender flowers, tied with a maroon ribbon to distinguish its packages from its rivals. The symbol used by Lavender is an example of a _____.
A. patent
B. domain name
C. service mark
Answer: C
Q:
Briefly describe the digital divide that exists in the United States.
Q:
Describe Jurisdiction in International Suits. Identify the circumstances under which countries have exercised their jurisdiction to adjudicate.
Q:
So far the Uniform Computer Information Transactions Act has been adopted only in the states of Maryland and _____.
A. California
B. Texas
C. Virginia
D. Ohio
Q:
Patents that address matters of basic communication and data handling which support and permit industrywide norms are called _____.
A. standard-essential patents
B. design patents
C. utility patents
D. quasi-legal patents
Q:
Which of the following is most likely to be a standard-essential patent?
A. A keyboard with a unique design
B. A technology that enables communication through satellite phones
C. A technology that enables enhanced voice recording in a smartphone
D. A wireless mouse for laptops
Q:
A. first sale doctrine.
B. first purchase doctrine.
C. fair control doctrine.
D. fair use doctrine.
Answer: D
Q:
The Internet address for a Web page is called its:
A. Internet service provider.
B. domain name.
C. server.
D. search engine.
Q:
The _____ proffered the Convention on Cybercrime as an international effort to address computer-facilitated crime.
A. United States Secretary of Commerce
B. Federal Trade Commission
C. Council of Europe
D. Department of Commerce
Q:
Which of the following statements is true of the Electronic Signatures in Global and National Commerce Act (E-SIGN)?
A. President Clinton had refused to sign it into law.
B. Under this act, consumers cannot be forced to accept electronic signature agreements.
C. It forces consumers to receive records and documents electronically rather than in paper form.
D. It does not give electronic signatures the same legal stature as handwritten ones.
Q:
Which of the following statements is true of the Uniform Computer Information Transactions Act?
A. It has not been widely approved in the U.S.
B. It focuses on procedural aspects such as electronic signatures.
C. It has been amended once.
D. It has been adopted in 20 of the 50 states.
Q:
The Childrens Online Privacy Protection Act:
A. makes it unlawful to use computers to solicit, lure, or entice a child, but it does not include the content of mobile phones.
B. seeks to criminalize online content harmful to minors based on contemporary community standards.
C. prohibits not just actual child pornography, but also material that depicts persons who appear to be minors or that is presented so it conveys the impression that the person depicted is a minor.
D. prohibits websites from collecting personal information from children under 13 without parental permission.
Q:
The _____ is charged with primary enforcement of the Childrens Online Privacy Protection Act (COPPA).
A. Consumer Financial Protection Bureau
B. Federal Trade Commission
C. Consumer Product Safety Commission
D. Food and Drug Administration
Q:
Which of the following is a provision of the Computer Pornography and Child Exploitation Prevention Act of 1999?
A. It prohibits websites from collecting personal information from children under 13, who use computers, without parental permission.
B. It requires that parents be allowed to review and correct any information collected about their children and published.
C. It makes it unlawful for companies manufacturing computers to employ children below the age of 15.
D. It makes it unlawful to use a computer to solicit, lure, or entice a child or otherwise engage in sexual offenses with a child.
Q:
The repeated use of electronic media (such as e-mail or chat rooms) to harass or threaten another person is referred to as:
A. cyberterrorism.
B. spear phishing.
C. cyberstalking.
D. VoIP spamming.
Q:
Catalina has been receiving threat messages from Steve, one of her Facebook contacts. Steve has never met Catalina, but he has been tracking her activities on the social network regularly. This is an example of:
A. cyberterrorism.
B. spear phishing.
C. cyberstalking.
D. VoIP spamming.
Q:
A(n) _____ is any person who takes data that are discrete at the level of an individual and combines it with individual-level data from one or more other sources.
A. aggregator
B. hacker
C. cyber stalker
D. spammer
Q:
Briefly explain nuisance, trespass, and strict liability.
Q:
Briefly describe the Kyoto Protocol. Has it been successful in achieving its fundamental objective?
Q:
Give some examples of environmental degradation in the United States and in the world.
Q:
Which of the following is a network of infected computers that can be harnessed to take coordinated action, such as sending spam?
A. Botnet
B. Adware
C. Malware
D. Spambot
Q:
_____ is the process of building profiles of individuals by organizing all the disparate pieces of information collected in the normal course of business.
A. Data mining
B. Phishing
C. Hacking
D. Whistleblowing
Q:
Which of the following events is reducing the worlds carbon sink capacity?
A. Rise in the number of endangered species in Asia
B. Burning of forests in the Amazon and Indonesia
C. Increase in the amount of phytoplankton in the Pacific Ocean
D. Expanding of the glaciers in the Arctic region
Q:
Discuss the cap-and-trade program.
Q:
Describe the role of tax laws in environmental protection in the United States.
Q:
What are the two national goals established by the Clean Water Act?
Q:
Discuss the enforcement actions available for the government agencies in case of environmental issues.
Q:
Describe in brief some of the challenges faced while protecting a species under the Endangered Species Act.
Q:
In an environmental law context, _____ has been considered where crop dusting contaminated adjacent properties, toxic chemicals were improperly disposed of, and oil contaminated a nearby water well.
A. trespass
B. strict liability
C. negligence
D. nuisance
Q:
Which of the following statements is true of the Kyoto Protocol?
A. It called for a 50 percent reduction from 1990 levels of greenhouse gas emissions to be achieved by 2010.
B. It became binding when ratified by 180 countries, on Russias ratification in late 2004.
C. It was ratified first by the United States.
D. It acknowledged that underdeveloped countries were principally responsible for the greenhouse gas levels at that time.
Q:
Which of the following countries is currently the largest emitter of greenhouse gases in the world?
A. China
B. India
C. The United Kingdom
D. The United States
Q:
A chemical plant has expanded with all the appropriate permits from related agencies. Since the expansion, people living within a few miles of the plant are awakened at night by the bright light and loud noise associated with flaring unused gas and chemicals from smokestacks. Assuming the flaring does not threaten the residents' safety, what common law claim would best address the citizens' complaints in this scenario?
A. A trespass claim
B. A negligence tort claim
C. A strict liability tort claim
D. A nuisance claim
Q:
Which of the following laws provides liability protection for prospective purchasers and contiguous property owners and authorizes increased funding for state and local programs that assess and clean up industrial sites that are no longer in use?
A. The Small Business Liability Relief and Brownfields Revitalization Act
B. The National Environmental Policy Act
C. The Toxic Substances Control Act
D. CERCLA
Q:
Which of the following was enacted for the purpose of identifying and cleaning up abandoned hazardous waste sites?
A. The Clean Water Act
B. The Toxic Substances Control Act
C. The Resource Conservation and Recovery Act
D. The Comprehensive Environmental Response, Compensation, and Liability Act
Q:
Which of the following statements is true of the Comprehensive Environmental Response, Compensation, and Liability Act?
A. Cleanups may be carried out by the Environmental Protection Agency or private parties.
B. It requires that parties involved in cleanups recover costs from the federal government.
C. It attaches liability only with proof of both intent and negligence.
D. Potentially responsible parties are limited to present owners of the site.
Q:
The _____ is commonly known as the Superfund.
A. Comprehensive Environmental Response, Compensation, and Liability Act
B. Clean Water Act
C. Clean Air Act
D. Resource Conservation and Recovery Act
Q:
Individuals may challenge government environmental decisions, such as the granting of a permit, and generally demand both governmental and private-sector compliance with the law in:
A. representative actions.
B. class actions.
C. citizen suits.
D. mass torts.
Q:
Under the Toxic Substances Control Act:
A. the waste generator must create a manifest to be used in tracking waste from its creation to its disposal.
B. the federal government is authorized to prohibit future open dumping.
C. the Environmental Protection Agency is empowered to review and limit or stop the introduction of new chemicals.
D. the companies importing new industrial chemicals must provide the required safety data to the Environmental Protection Agency even if the data they have does not suggest the chemical poses a substantial risk.
Q:
The act governing the safe movement and disposal of hazardous solid wastes is the:
A. Clean Water Act.
B. Toxic Substances Control Act.
C. Comprehensive Environmental Response, Compensation, and Liability Act.
D. Resource Conservation and Recovery Act.
Q:
Which of the following acts addresses the dangers of both nonhazardous and hazardous solid wastes?
A. The Clean Air Act
B. The Clean Water Act
C. The Resource Conservation and Recovery Act
D. The National Environmental Policy Act
Q:
Which of the following statements is true of the Resource Conservation and Recovery Act?
A. Its provisions exclude safe movement and disposal of hazardous solid wastes.
B. It covers recycled hazardous materials.
C. Its provisions for nonhazardous solid wastes are more supportive than punitive.
D. It vests authority with the states rather than the federal government.
Q:
Seventy percent of the toxic waste in the landfills comes from _____.
A. food items
B. medicines
C. electronics
D. industrial chemicals