PREVIOUS QUESTION & ANSWER

Q :
A :

 ·         Question 1

5 out of 5 points

   
 

What was the first state to have a breach notification law?

     

Selected Answer:

Correct 

California

Answers:

Utah

 

Texas

 

New York

 

Correct 

California

     

·         Question 2

5 out of 5 points

   
 

The term shrinkwrap almost exclusively refers to software license agreements that are included within a box of physical-media software.

     

Selected Answer:

Correct

True

Answers:

Correct

True

 

False

     

·         Question 3

5 out of 5 points

   
 

_____________________ is the area of law that protects a person’s creative ideas, inventions, and innovations.

     

Selected Answer:

Correct 

Intellectual property law

Answers:

Correct 

Intellectual property law

 

Civil law

 

Criminal law

 

Property interest law

     

·         Question 4

5 out of 5 points

   
 

The strongest type of a trademark is a descriptive trademark. A trademark is descriptive when it describes the underlying product that it represents.

     

Selected Answer:

Correct

False

Answers:

True

 

Correct

False

     

·         Question 5

5 out of 5 points

   
 

Though it is not a law, businesses that wish to accept credit cards for payment must follow the PCI DSS, which is enforced by major credit companies like Visa and MasterCard.

     

Selected Answer:

Correct

True

Answers:

Correct

True

 

False

     

·         Question 6

5 out of 5 points

   
 

Which of the following lack(s) contractual capacity to enter into a contract:

     

Selected Answer:

Correct 

people who are mentally incompetent

Answers:

children under the age of 16

 

Correct 

people who are mentally incompetent

 

undocumented U.S. citizens

 

people who have a criminal record

     

·         Question 7

5 out of 5 points

   
 

A browsewrap contract is usually presented to users when they are purchasing software or services via the Internet.

     

Selected Answer:

Correct

False

Answers:

True

 

Correct

False

     

·         Question 8

5 out of 5 points

   
 

__________________ are money awards that compensate the non-breaching party for the foreseeable damages that arise from circumstances outside of the contract and can’t be mitigated.

     

Selected Answer:

Correct 

Consequential damages

Answers:

Compensatory damages

 

Correct 

Consequential damages

 

Liquidated damages

 

Nominal damages

     

·         Question 9

5 out of 5 points

   
 

The purpose of the ___________________ is to remove barriers to electronic commerce by validating electronic contracts.

     

Selected Answer:

Correct 

Uniform Electronic Transactions Act (UETA)

Answers:

Uniform Commercial Code (UCC)

 

Electronic Signatures Act (ESA)

 

Correct 

Uniform Electronic Transactions Act (UETA)

 

Electronic Communications Act (ECA)

     

·         Question 10

5 out of 5 points

   
 

What is considered to be personal information by most states?

     

Selected Answer:

Correct 

both A and B

Answers:

Social Security numbers

 

account numbers

 

Correct 

both A and B

 

neither A nor B

     

·         Question 11

5 out of 5 points

   
 

An infringer is a person who owns a patent but doesn’t intend to make, use, or sell the invention. The term refers to a person who is overly aggressive and opportunistic.

     

Selected Answer:

Correct

False

Answers:

True

 

Correct

False

     

·         Question 12

5 out of 5 points

   
 

What is a legal concept that protects an entity from legal liability and is written into the law? Entities that encrypt the personal information that they own or maintain do not have to follow the notification requirements of this concept if they have a data breach.

     

Selected Answer:

Correct 

safe harbor

Answers:

safety net

 

caveat emptor

 

Correct 

safe harbor

 

the Malpractice Act of 1998

     

·         Question 13

5 out of 5 points

   
 

Copyright owners allow others to use their copyrighted material by using a special kind of contract called a license.

     

Selected Answer:

Correct

True

Answers:

Correct

True

 

False

     

·         Question 14

5 out of 5 points

   
 

A ______________ protects the formulas, processes, methods, and information that give a business a competitive edge.

     

Selected Answer:

Correct 

trade secret

Answers:

copyright

 

utility patent

 

Correct 

trade secret

 

strict liability

     

·         Question 15

5 out of 5 points

   
 

The ChoicePoint data breach is unique because if it weren’t for the California breach notification law, ChoicePoint might not have notified any consumers at all about the data breach. Other states, such as Illinois, realized that their residents might not be able to protect themselves from identity theft in similar situations without these laws. Thirty-five states considered breach notification laws in 2005, and the ChoicePoint case is widely seen as the reason why other states have these laws.

     

Selected Answer:

Correct

True

Answers:

Correct

True

 

False

     

·         Question 16

5 out of 5 points

   
 

A legal owner of property has the right to use that property in any way they want to, and the power to give those rights to another. This is called _____________.

     

Selected Answer:

Correct 

property interest

Answers:

copyright

 

trade secret

 

Correct 

property interest

 

intellectual property

     

·         Question 17

5 out of 5 points

   
 

Which one of the following is not one of the additional terms that a contract should have in order to address regulatory requirements?

     

Selected Answer:

Correct 

language protecting the intellectual property rights of the vendor

Answers:

GLBA language if financial data is used or transmitted between the parties

 

Correct 

language protecting the intellectual property rights of the vendor

 

HIPAA language if health information is used or transmitted between the parties

 

Family Educational Rights and Privacy Act (FERPA) of 1974 language if student information is used or transmitted between the parties

     

·         Question 18

5 out of 5 points

   
 

Providing infrastructure capabilities through the Internet is referred to as hosted applications.

     

Selected Answer:

Correct

False

Answers:

True

 

Correct

False

     

·         Question 19

5 out of 5 points

   
 

Although California law doesn’t assess any penalties against an entity that doesn’t follow the notification law, it does permit a person a private cause of action against those entities. People can sue the private entity for any damages they have because they didn’t receive notification in a timely manner

     

Selected Answer:

Correct

True

Answers:

Correct

True

 

False

     

·         Question 20

5 out of 5 points

   
 

Which of the following statements best captures the difference between civil law and criminal law?

     

Selected Answer:

Correct 

In civil law, a defendant isn’t sent to jail as a punishment. Instead, civil law imposes fines.

Answers:

Criminal law requires a trial by jury, whereas civil law requires only a hearing.

 

Correct 

In civil law, a defendant isn’t sent to jail as a punishment. Instead, civil law imposes fines.

 

In civil law a defendant is not required to reimburse a plaintiff for damages, whereas this is a requirement in criminal law.

 

Criminal law only requires paying fines, whereas in civil law the punishment is jail.

     

 


Related Questions & Answer

Get Your Solution Free




Get Your Solution Paid




DEMO