Unit 02 Environment border Searches Your Electronic Devices3when Maja Attorney

subject Type Homework Help
subject Pages 3
subject Words 532
subject Authors Frank B. Cross, Roger LeRoy Miller

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Appendix B for Unit Two
Questions on the Features
N.B.: TYPE indicates that a question is new, modified, or unchanged, as follows.
N A question new to this edition of the Test Bank.
+ A question modified from the previous edition of the Test Bank.
= A question included in the previous edition of the Test Bank.
CHAPTER 5INSIGHT INTO E-COMMERCE:
DO COMPUTERS HAVE FREE SPEECH RIGHTS?
1. FastBreak Inc. is dissatisfied with its ranking in Google Inc.’s search results.
FastBreak files a suit against Google, seeking an injunction. Google argues
that its search results are constitutionally protected speech. FastBreak’s best
argument against Google’s position is that
a. the First Amendment protects humans against state censorship and
protecting a computer’s speech is not related to that purpose.
b. the trillions of decisions made by computers each day do not all
constitute protected speech.
c. computerized algorithms, which generate computer language, do not
constitute speech.
d. search results constitute commercial speech, for which the First
Amendment provides only limited protection.
page-pf2
2 TEST BANKUNIT TWO: THE PUBLIC AND INTERNATIONAL ENVIRONMENT
CHAPTER 7INSIGHT INTO THE GLOBAL ENVIRONMENT:
EVEN SMARTPHONES ARE VULNERABLE TO INTERNATIONAL CYBER
ATTACKS
2. Recent advances have fostered the growth of a relatively new industry to profit
from crime. Statistics show that criminals have learned it is easier, less risky,
and more profitable to
a. rob banks using traditional means.
b. steal via the Internet.
c. engage in legitimate activities such as stock trading via the Internet.
d. sell their stories to movie, music, and TV producers or video-game
makers.
CHAPTER 8INSIGHT INTO THE GLOBAL ENVIRONMENT:
BORDER SEARCHES OF YOUR ELECTRONIC DEVICES
3. When Maja, an attorney and a U.S. citizen, crosses the border between the
United States and Canada, she expects the U.S. Department of Homeland
Security to search her laptop. To avoid disclosing confidential client data during
the search, Maja could
a. keep client files on a device that she does not take abroad.
b. carry client files abroad only in hard copy.
c. refuse to consent to a border search of her laptop.
d. assert her right to be free from unwarranted government intrusion.
page-pf3
APPENDIX B FOR UNIT TWO 3
UNIT TWOFOCUS ON LEGAL ETHICS:
THE PUBLIC AND INTERNATIONAL ENVIRONMENT
4. Facetime Social Media Inc. sells its users’ personal information. This may
violate
a. businesses’ duties to their customers.
b. individuals’ rights to their privacy.
c. governments’ duties and rights with respect to public welfare.
d. no rights or duties.
5. ReadIt, Inc., develops an internationally popular Web site, tailoring its features
to the censorship requirements of various governments. Critics charge ReadIt
with “decapitating the voice of dissent.” Ethically, the best argument in favor of
ReadIt’s policy is
a. ReadIt is merely following the lead of governments everywhere.
b. ReadIt is only seeking profits in lucrative markets.
c. ReadIt’s action is a common international practice.
d. ReadIt’s approach is a move toward more open access in the future.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.