Business and Personal Law

Chapter 19: Cyberlaw and E-Commerce

Online Practice Tests

1
Cyberspoofing is a crime in which a person
A)creates a virus to disrupt someone else's computer network.
B)commits cyberextortion or blackmail.
C)falsely adopts the identity of someone else in order to commit fraud.
D)uses a computer to steal data stored in digital format.
2
Firewalls and anti-virus software are specifically designed to protect your computer from acts of
A)cybergerm warfare.
B)cybertorts.
C)cyberterrorism.
D)identity theft.
3
Using a computer to steal financial, employment, or personal data from someone is called
A)cyberspoofing.
B)identity theft.
C)electronic theft.
D)cyberinvasion of privacy.
4
A legal protection for literary, artistic, and scientific works is called a
A)copyright.
B)domain.
C)trademark.
D)patent.
5
The No Electronic Theft Act provides prison terms and fines for anyone who
A)participates in cyberblackmail.
B)is convicted of disrupting the national electronic infrastructure.
C)commits fraud using a digital signature.
D)creates an electronic duplicate of a copyrighted work for commercial gain.
6
The Uniform Computer Information Transaction Act
A)provides jurisdiction for Web sites in all 50 states.
B)governs the law for cybercontracts.
C)provides copyright protection for digital artists.
D)makes electronic banking available in all 50 states.
7
A domain name is the
A)server where the Web site is located.
B)trademark used on a business Web site.
C)copyrighted name of the business.
D)Internet address of the business.
8
The E-Sign Act ensures that any
A)digital signatures are copyrighted.
B)online signs and banners meet federal regulations.
C)domain name is registered so that cybersquatters do not have access to them.
D)cybercontract is as legal as its paper equivalent if the parties agree to use digital signatures.
9
A copyright extends for the creator's life plus
A)50 years.
B)60 years.
C)70 years.
D)100 years.
10
The Electronic Communications Privacy Act
A)restricts the unauthorized access of e-mail and instant messaging.
B)allows employers to access employees' email without permission.
C)protects Internet Service Providers from being held liable for any cyberdefamation performed by users on these services.
D)protects electronic financial records from being opened by anyone except when authorized by court order.
Glencoe Online Learning CenterBusiness Administration HomeProduct InfoSite MapContact Us

The McGraw-Hill CompaniesGlencoe