Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

please answer all .,.,.the questions,.,.,.within 30 minutes. make sure the explanation and reasons are explained in very detailed manner as in why the option is

please answer all .,.,.the questions,.,.,.within 30 minutes. make sure the explanation and reasons are explained in very detailed manner as in why the option is correct and why other options sre incorrect give reasons for the same , Attempt the answer only if your are 100% sure that its correct. else leave it for other tutor otherwise i will give negative ratings and will also report your answer for unprofessionalism. Make sure the answer is 100% correct and is not copied from anywhere. ATTEMPT THE QUESTION ONLY IF YOU ARE 100% CORRECT AND SURE. ELSE LEAVE IT FOR ANOTHER TUTOR. BUT PLEASE DONT PUT WRONG ANSWER ELSE I WILL REPORT.

MAKE SURE THE REASON WHY THE OPTIONS ARE WRONG OR INCORRECT IS THOROUGHLY EXPLAINED, ELSE I WILL REPORT THE ANSWER.

image text in transcribedimage text in transcribed
1Basso includes in his song "Chords" a few seconds of Dante's copyrighted sound recording \"Etudes" without permission. Some federal courts have found that such digital sampling is a. a violation of copyright law. b. all of the choices. c. a \"fair use" exception to the provisions of the act. d. not a "fair use" exception to the provisions of the act. 2Jase transfers selected musical recordings, without the copyright owners' authorization. through his phone to his friends. Jase does not charge his friends for his "service." This is a. "fair use." b. a license. c. goodwill. d. copyright infringement. 3Employees of Bodega Inc. maintain a password protected social media page to \"vent about work." Bodega learns ofthe page and intimidates the network that operates it into revealing the password. After reviewing the posts, Bodega fires the participants. Most likely, this is a. a violation of the Stored Communications Act. b. a "businessrextension exception" under the Electronic Communications Privacy Act. c. within the employer's rights. d. a subject for dispute resolution by the network. 4Payback Inc. discovers that defamatory statements about its policies are being posted in an online forum. 0 Web Inc., the Internet service provider whose users are posting the messages, refuses to reveal the users' identities. To obtain those identities, Payback should initially a. file a suit against 0 Web. b. ask the U.S. Department of Justice to issue a subpoena. c. file a suit against the anonymous users. d. gain unauthorized access to Q Web's servers. SrWith respect to spam, thirtyrseven states a. prescribe its use. b. preempt the application of federal law on the same subject. c. prohibit or regulate it. d. permit its use by business entities. 6Sales Corps Inc. provides tablets for its employees to use \"in the ordinary course of its business.\" Sales Corps intercepts the em ployees' business communications made on these devices. Under the Electronic Communications Privacy Act, this is a. a subject for dispute resolution by an Internet service provider. b. prohibited. c. a matter for which an employer must obtain employees' consent. d. permissible. 7Interactive Entertainment Corporation markets its products online. Through the use of cookies, Interactive Entertainment and other online marketers can a. gain access to competitors' servers. b. \"sweet talk" consumers into buying certain products. c. track individuals' Web browsing activities. d. attack com petitors' Web sites. BRoss registers a domain name sweetfriedpotatoscomithat is a misspelling of a popular brandisweetfriedpotatoescom. This is a. typosquatting. b. trademark dilution. c. cybersquatting. d. trademark infringement. 9The employees of Eco Engineering Inc. share companyrelated resources among multiple computers without requiring a central network server. This is a. peertopeer (P2P) networking. b. digital sampling. c. cloud computing. d. cybersquatting. lOOdell is an employee of Packing Corporation. She uses social media in a way that violates her employer's stated social media policies. Packing disciplines Odell and then, after a second transgression, fires her. This is a. a \"businessextension exception\" underthe Electronic Communications Privacy Act. b. a subject for dispute resolution by social media. c. a violation of the Stored Communications Act. d. within the employer's rights

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Small Business Management Entrepreneurship and Beyond

Authors: Timothy s. Hatten

5th edition

538453141, 978-0538453141

More Books

Students also viewed these General Management questions

Question

gpt 5 1 9 .

Answered: 1 week ago