Exam 2 - Chapter 8 (old)
27) Which of the following is a core Fair Information Practices (FIP) principle? A) Choice/Consent B) Access/Participation C) Security D) Enforcement
a
51) What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law? A) the ability to make perfect copies of digital works at little cost B) the anonymous nature of the Internet C) the support for instant peer-to-peer communication D) the use of standards for file formats
a
56) All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except: A) up to ten years imprisonment for a first offense. B) fines up to $500,000 for a first offense. C) fines up to $1 million for a repeat offense. D) restitution to the injured parties for any losses due to infringement.
a
69) Safe harbor provisions of the Digital Millennium Copyright Act (DMCA) were at issue in all the following lawsuits except: A) a lawsuit filed by the Authors Guild and five major publishing companies against Google B) a lawsuit brought by Viacom against YouTube and Google C) BMG Rights Management v. Cox Communications. D) Mavrix Photographs, LLC v. LiveJournal, Inc.
a
73) All of the following cases involved the doctrine of fair use except: A) Spokeo v. Robins B) Perfect 10, Inc. v. Amazon.com, Inc. et al. C) Field v. Google, Inc. D) Kelly v. Arriba Soft.
a
11) Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost? A) the Slippery Slope B) Risk Aversion C) No Free Lunch D) the Collective Utilitarian principle
b
13) Downloading a music track owned by a record company without paying for it is an example of a violation of: A) patent law. B) copyright law. C) trademark law. D) privacy law.
b
37) Which of the following is not a privacy advocacy group? A) EPIC B) TIO C) CDT D) EFF
b
1) Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying? A) information density B) interactivity C) social technology D) ubiquity
c
12) A social consequence of the richness of Internet information is: A) an increase in shallowness. B) an increase in the ease of creating misleading information. C) very persuasive messages might reduce the need for multiple independent sources of information. D) an increase in vulnerability to hacking attacks.
c
22) Which of the following is used to track individuals as they move among thousands of websites? A) first-party cookies B) digital wallets C) advertising networks D) shopping carts
c
23) Which of the following uses software installed at the ISP level to track user clickstream behavior? A) shopping carts B) trusted computing environments C) deep packet inspection D) DRM
c
32) Which of the following technologies reduces the ability to merge different files and de-anonymize consumer data? A) anonymous surfing B) anonymous remailers C) differential privacy software D) public key encryption
c
53) How long does copyright protection extend for corporate-owned works? A) 25 years B) 50 years C) 75 years D) 95 years
d
72) Which of the following involves bypassing the target site's home page and going directly to a content page? A) cybersquatting B) metatagging C) framing D) deep linking
d
30) What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)? A) Require firms to have consumers affirmatively opt-in before PII is collected. B) Require firms to allow consumers to opt-out before PII is collected. C) Make collection of PII illegal. D) Require robust notice only before PII is collected.
a
33) Which of the following is an example of a pay-for-privacy (PFP) approach? A) AT&T's GigaPower service B) Meeco.me's life management tool C) Digi.me's app D) The Hub of All Thing's open source project
a
50) Which of the following cases has chipped away at the Digital Millennium Copyright Act (DMCA) safe harbor protection? A) Field v. Google, Inc. B) Alice Corporation Pty. Ltd. v. CLS Bank International C) BMG Rights Management v. Cox Communications D) Perfect 10, Inc. v. Amazon.com, Inc. et al.
a
38) Which of the following was the first state law in the United States requiring owners of commercial websites or online services to post a privacy policy. A) California Consumer Privacy Act B) California Net Neutrality Act C) California Electronic Communications Privacy Act D) California Online Privacy Protection Act
d
4) What is the first step in analyzing an ethical dilemma? A) Define the conflict or dilemma and identify the higher-order values involved. B) Identify the potential consequences of your opinions. C) Identify the options you can reasonably take. D) Identify and describe the facts.
d
55) All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the: A) nature of the work used. B) amount of the work used. C) market effect of the use. D) free availability of the work on the Web.
d
62) Disputes over federal trademarks involve establishing: A) underlying ideas. B) intent. C) piracy. D) infringement
d
7) Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise? A) the Golden Rule B) the Slippery Slope C) the Social Contract Rule D) No Free Lunch
d
82) Which of the following is not an e-commerce public safety and welfare issue? A) regulation of gambling B) regulation of cigarette sales C) regulation of pornography D) regulation of taxation
d
52) Which of the following protects original forms of expression in a tangible medium? A) trade secret law B) copyright law C) patent law D) trademark law
b
60) Which case was instrumental in paving the way for Internet business methods patents? A) Bilski et al. v. Kappos B) State Street Bank & Trust Co. v. Signature Financial Group, Inc. C) Alice Corporation Pty. Ltd. v. CLS Bank International D) Ticketmaster Corp. v. Tickets.com
b
65) Registering a domain name similar or identical to trademarks of others to divert web traffic to their own sites is an example of: A) cybersquatting. B) cyberpiracy. C) framing. D) metatagging.
b
66) Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of: A) cybersquatting. B) typosquatting. C) metatagging. D) linking.
b
70) According to the chapter-ending case study, all of the following are examples of big tech firms that have engaged in activities that raise antitrust issues, except: A) Amazon B) Apple C) Google Drive D) Facebook
b
8) Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to take at all? A) Universalism B) the Slippery Slope C) the Social Contract Rule D) the Golden Rule
b
34) All of the following are required for information to be considered a trade secret except: A) it must have commercial value to its owner. B) the owner must have taken steps to protect it. C) it must be unique. D) it must be something that others do not know.
c
64) Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures? A) ICANN B) FTC C) WIPO D) USPTO
c
67) In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented? A) State Street Bank & Trust v. Signature Financial Group, Inc. B) Bilski et al. v. Kappos C) Alice Corporation Pty. Ltd. v. CLS Bank International D) BMG Rights Management v. Cox Communications
c
79) The Day of Action was a protest to proposed changes in regulations pertaining to which of the following? A) fantasy sports B) Internet sales taxes C) net neutrality D) the online sale of prescription drugs
c
2) Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products? A) ubiquity B) interactivity C) information density D) global reach
d
20) Which of the following basic ethical concepts plays an important role in defining privacy? A) responsibility B) accountability C) liability D) due process
d
9) Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society? A) the Golden Rule B) Risk Aversion C) the Slippery Slope D) the Social Contract Rule
d
35) According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online? A) used an anonymous web browsing service B) encrypted their communications C) cleared web browser history and cookies D) posted comments online anonymously
c
36) Which of the following statements about the General Data Protection Regulation (GDPR) is not true? A) The GDPR replaces the Data Protection Directive. B) The GDPR applies to any firm operating in any E.U. country. C) The GDPR eliminate the right to be forgotten. D) The GDPR limits the ability of companies to use data for purposes other than those for which it was collected.
c
5) Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society? A) the Golden Rule B) Risk Aversion C) the Collective Utilitarian principle D) the Social Contract Rule
c
25) The Spokeo case involved a claim for damages based on which of the following? A) Fair Credit Reporting Act B) Digital Millennium Copyright Act C) Anticybersquatting Consumer Protection Act D) Defend Trade Secrets Act
a
59) All of the following statements about patents are true except: A) it is more difficult to obtain a copyright than it is to obtain a patent. B) the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods. C) computer programs can be patented. D) in order to be patented, an invention must be nonobvious.
a
6) Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision? A) the Golden Rule B) Universalism C) the Collective Utilitarian principle D) the Social Contract Rule
a
63) Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of: A) cybersquatting. B) cyberpiracy. C) framing. D) metatagging
a
78) Which of the following Supreme Court cases established that states can compel online retailers to collect and remit sales taxes even if they do not have a physical presence within the state? A) South Dakota v. Wayfair B) Bilski et al. v. Kappos C) Quill v. North Dakota D) Alice Corporation v. CLS Bank International
a
10) Which ethical principle tells you that it is wise to assume perfect information markets? A) the Golden Rule B) the New York Times test C) the Social Contract Rule D) the Collective Utilitarian principle
b
14) Which of the following features of e-commerce technology can result in work and shopping invading family life? A) interactivity B) ubiquity C) information density D) global reach
b
26) Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records? A) Freedom of Information Act B) Gramm-Leach-Bliley Act C) COPPA D) HIPAA
b
29) Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place? A) Notice/Awareness B) Choice/Consent C) Access/Participation D) Security
b
3) Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture? A) accountability B) privacy C) responsibility D) liability
b
31) "Do Not Track" falls under which of the following principles in the FTC's current privacy framework? A) Privacy by Design B) Simplified Choice C) Greater Transparency D) Scope
b
57) All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except: A) the DMCA makes it illegal to circumvent technological measures to protect works. B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement. C) the DMCA requires search engines to block access to infringing sites. D) the DMCA allows libraries to make digital copies of works for internal use only.
b
54) Which of the following situations would not qualify for the fair use exception to U.S. copyright law? A) A professor clips a newspaper article just before class and distributes copies of it to his class. B) A journalist quotes a paragraph from a book in a review of the book. C) A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website. D) Google posts thumbnail images of books in the Google Book Search Project.
c
58) Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years? A) copyright law B) trade secret law C) patent law D) trademark law
c
61) Which of the following is considered one of the most contentious e-commerce patents? A) Acacia Technologies' patent on streaming video media transmission B) Priceline's patent on buyer-driven name your price tools C) Amazon's patent on one-click purchasing D) Google's PageRank patent
c
68) The display of a third-party's website or page within your own website is called: A) cybersquatting. B) metatagging. C) framing. D) deep linking
c
71) Which of the following cases involved the issue of keywording? A) Ticketmaster Corp. v. Tickets.com B) Bernina of America, Inc. v. Fashion Fabrics Int'l, Inc. C) Government Employees Insurance Company v. Google, Inc. D) E. & J. Gallo Winery v. Spider Webs Ltd.
c
21) Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge? A) USA PATRIOT Act B) Homeland Security Act C) Communications Assistance for Law Enforcement Act D) USA Freedom Act
d
28) Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data? A) Notice/Awareness B) Choice/Consent C) Access/Participation D) Security
a
