Business Flashcards

Business Law questions, exam 2 (random quizlet found)

The bases of all torts are wrongs and compensations True
Logistics Trucking Company operates a fleet of fuel trucks. When one of the trucks is positioned to receive a load of biofuel, it strikes a storage tank owned by Metro Biofuel, Inc. For the cost of repairing the damage to the tank, Metro is most likely to be awarded compensatory damages
The purpose of tort law is to provide remedies for the violation of various protected interests True
A tortfeasor is one who wrongfully alleges that a tort has been committed False
Diego is arrested for a theft committed by someone who stole his identity. A court orders his release, but due to a police error in Diego’s paperwork, he is held in jail for a month. The police are most likely liable for False Imprisonment
From a computer in a distant location, Viktor searches Wilma’s personal computer without her permission. Viktor is most likely liable for invasion of privacy
Marcos wants to buy Lucia’s land, but she refuses to sell. Marcos begins using subpoenas, court orders, and other formal legal procedures in an unrelenting effort to force Lucia to sell. This is Abuse of process
Felix tells Genie, a prospective tenant, that the roof of the Valley View Apartments building does not leak when Felix knows that it does. This may give rise to an action for fraud, because the statement is one of a fact
ProHome Pest Exterminators Inc. advertises so effectively that the regular customers of its competitor Quick Pest Elimination Company patronize ProHome instead. This is ____
Normally, fraud occurs only when there is justifiable reliance on a true statement. false
Federal law prohibits the Federal Trade Commission from cooperating and sharing information with foreign agencies in investigating and prosecuting those involved in spamming. False
Usind a domain name that is an identical or similar to the trademark of another is legal False
Tech Outsourcing, Inc., registers a domain name that is the same as, or confusingly similar to, the trademark of Tech Resourcing Corporation and then offers to sell the domain name back to Tech Resourcing. This is cybersquatting
Using another’s trademark in a meta tag does not normally constitute trademark infringement, even if it is done without the owner’s permission. false
Rowan registers a domain name——that is a misspelling of a popular brand— This is typosquatting
A claim of trademark dilution requires proof that consumers are likely to be confused by a connection between the unauthorized use and the mark. false
Employers cannot monitor employees’ electronic communications made in the ordinary course of business. false
Cyber torts are torts that arise from online conduct. true
To maintain a suit for the invasion of privacy, a person must have a reasonable expectation of privacy in the particular situation. true
Global Reach Corporation uses invisible files created on the computers, smartphones, and other mobile devices of visitors to its Web sites to track the users’ browsing activities. These files are cookies
A misdemeanor is a crime punishable only by a fine false
Thinking about killing someone constitutes the crime of attempted murder. false
Picking pockets is not robbery True
A person who commits larceny can be sued under tort law. true
A person’s intent to return embezzled property—or its actual return—is not a defense to the crime of embezzlement. True
A kickback for a special favor or service is a form of bribery in some situations. True
Ordinarily, “ignorance of the law” or a mistaken idea about what the law requires is a valid defense to criminal liability. False
Annalee, an employee of Byron & Byron, Certified Public Accountants, is arrested at work. A grand jury issues a formal charge against Annalee for embezzlement. This charge is an indictment
Posing as Visa Bank, Walt e-mails Paulina, asking her to update her credit-card information through a link in the e-mail. She clicks on the link and types in the data, which Walt promptly sells to Ilana. This is phishing
Via the Internet, Lok sabotages the computer system of Metro Water Commission, a municipal water supplier, so that Metro’s pumping system breaks down, halting the delivery of water to Metro’s customers. Lok is a cyberterrorist

Leave a Reply

Your email address will not be published. Required fields are marked *