Upload
dorthy-strickland
View
216
Download
0
Tags:
Embed Size (px)
Citation preview
Nasca 2010
100 100 100 100
200 200 200 200
300 300 300 300
400 400 400 400
500 500 500 500
Agency Authority and Termination
(Chapter14)
Employment Law
(Chapter 15)
Agency and Employment
(Chapter 13)Cyberlaw and E-Commerce
(Chapter 19)
The agency relationship involves three parties:
the genuine agent, the special agent, and the contractor.
the independent contractor, the master, and the servant.
the principal, the agent, and the third party. the principal, the master, and the servant.
the principal, the agent, and the third party.
100
The person the agent deals with on behalf of the principal is called the
coagent. proprietor.servant.
third party.
third party.
200
Which of the following is not a type of agent?
agent's agent general agent
new agent special agent
new agent
300
A subagent is an agent
who can hire and fire employees. who serves as a discretionary agent.
who has authority to perform any act within the scope of the business.
lawfully appointed by another agent.
lawfully appointed by another agent.
400
An agent who represents a principal for free is called a(n)
estoppel agent. ratified agent. master agent.
gratuitous agent.
gratuitous agent.
500
An agent's obligation to deal honestly with another party is known as
good faith. habeas corpus
implied authority. mutual agreement.
good faith.
100
If agents enter into contracts on behalf of their principals without authority to do so,
the agent is liable for the contract. the principal is still liable for the contract.
both the principal and the agent are liable for the contract.
no one is liable for the contract.
the agent is liable for the contract.
200
An agency relationship can be terminated
by the doctrine of respondeat superior. by actual notice or notice by publication.
only through a court of law. by operation of law or by the acts of the
parties.
by operation of law or by the acts of the parties.
300
An agent may withdraw from the agency
at the end of the year. at the end of the contract.
with proper noticeat any time.
at any time.
400
A principal is generally bound to the terms of a contract made by an agent unless
the agent has no authority to enter into the contract. negligent retention has occurred.
the principle of respondeat superior is in place. the agent is considered a master.
the agent has no authority to enter into the contract.
500
A government program providing continuing income to workers and their dependents when they retire or
are disabled is called the
Employment Retirement Income Security Act. Family and Medical Leave Act.
Social Security Act. Unemployment Compensation Act.
Social Security Act.
100
Employment-at-will means that an
employee may choose to join a union at any time during his or her employment.
employer may discharge an employee at any time, for any or no reason, with or without notice.
employer can refuse a collective bargaining agreement at any time during the contract period.
employee may collect severance pay if a layoff is forced due to a downturn in the economy.
employer may discharge an employee at any time, for any or no reason, with
or without notice. 200
OSHA sets
procedures to be used in the event an employee becomes unemployed.
safety and health standards for many companies in the United States.
the equal pay rule for most companies in the United States.
rules related to an employee's benefit package.
safety and health standards for many
companies in the United States.
300
Under Title VII of the Civil Rights Act of 1964, interviewers MAY ask applicants questions
about
marital status. religion.
race. work experience.
work experience.
400
The law requiring employers to negotiate wages, hours, and conditions of employment with unions
is called the
Landrum-Griffin Act. Norris-LaGuardia Act.
Taft-Hartley Act. Wagner Act.
Wagner Act.
500
Cyberspoofing is a crime in which a person
commits cyberextortion or blackmail. creates a virus to disrupt someone else’s computer
network. falsely adopts the identity of someone else in order
to commit fraud. uses a computer to steal data stored in digital
format.
falsely adopts the identity of someone else in order to
commit fraud.
100
Communication via computer of false data that damages a person's reputation is
cyberblackmailcyberdefamation
cyberspoofing cyberprivacy
cyberdefamation
200
Firewalls and anti-virus software are specifically designed to protect your computer from acts of
cybergerm warfare. cybertorts.
cyberterrorism. identity theft.
cybergerm warfare.
300
A legal protection for literary, artistic, and scientific works is called a
copyright. domain.
trademark. patent.
copyright
400
The No Electronic Theft Act provides prison terms and fines for anyone who
commits fraud using a digital signature.
is convicted of disrupting the national electronic infrastructure.
creates an electronic duplicate of a copyrighted work for commercial gain.
participates in cyberblackmail.
creates an electronic duplicate of a copyrighted work for commercial gain.
500