Question: Can I get the answer for these multiple choice questions? These questions are in the lessons of textbook Principle of Canadian Business Law 71) Pursuant
Can I get the answer for these multiple choice questions? These questions are in the lessons of textbook Principle of Canadian Business Law
71) Pursuant to the Criminal Code, which of the following offences would be committed by a hacker who enters a computer system and retrieves data:
A)Unlawful interference with private interests
B)Illegal intrusion into a computer
C)Unlawful hacking
D)Misuse of a computer
E)Unauthorized use of a computer
F)
72) Pursuant to the Criminal Code, which of the following offences would be committed by a hacker who enters a computer system and rewrites a program:
A)Illegal intrusion into a computer system
B)Cyber mischief
C)Mischief in relation to data
D)Hacking wit intent to do mischief
E)Unlawful interference with private interests
73) Hurray Limited has reason to believe that one of its recently fired employees who stole a CD containing its secret manufacturing formula, plans to make this information public. Which of the following remedies should Hurray Limited be advised to seek:
A)An Anton Piller order
B)An accounting
C)Punitive Damages
D)Compensatory damages
E)An interim injunction
74) Hurray Limited has reason to believe that one of its recently fired employees has stolen a CD containing confidential business information and has been reproducing software based upon this information. Hurray suspects that the employee is operating from a warehouse outside of a small town but fears that if he is served with formal court documents he will destroy all evidence of his activities before the matter comes on for trial. Which of the following remedies should Hurray Limited be advised to seek:
A)Compensatory damages
B)Punitive Damages
C)An Anton Piller order
D)a An interim injunction
E)An accounting
75) Which of the following intellectual property rights protect the logo used by DELL on its computers:
A)Copyright
B)Patent
C)Trade Secret
D)Design Right
E)Trademark
76) Which of the following intellectual property rights protect the processors manufactured by Intel for use in personal computers:
A)Trademark
B)Copyright
C)Patent
D)Trade Secret
E)Design Right
77) Which of the following sections of the Criminal Code, would likely be breached by a person who in one series of events hacks into a library's computer system and plants a virus which two weeks later becomes active and destroys the computer hardware:
A)Section 430 (1.1)
B)Section 342.1
C)A and C
D)Section 80
E)B and C-
78) Which of the following is not a civil remedy:
A)Fine
B)Anton Piller Order
C)Injunction
D)These are all civil remedies
E)Damages
79) Which of the following intellectual property rights protected the Coca Cola formula:
A)design right
B)copyright
C)patent
D)confidential formula
E)trademark
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
