State the prohibited practices under the Telephone Consumer Protection Act of 1991
What will be an ideal response?
The Telephone Consumer Protection Act of 1991 restricts the activities of telemarketers and bans certain interstate telephone sales practices altogether. Some of the prohibited practices include:
a. Calling a person's residence at any time other than between 8:00 a.m. and 8:00 p.m.
b. Claiming an affiliation with a governmental agency at any level when such an affiliation does not exist
c. Claiming an ability to improve a consumer's credit records or to obtain loans for a person regardless of that person's credit history
d. Not telling the receiver of the call that it is a sales call
e. Claiming an ability to recover goods or money lost by a consumer
You might also like to view...
Describe the two important guidelines for revenue recognition.
What will be an ideal response?
Backyard BBQ is a chain of casual restaurants that promises affordable barbecue using top-quality local ingredients. However, the company has struggled to achieve a competitive advantage because of its high overhead costs. Which of the following scenarios is most likely to result in a competitive advantage?
A. eliminating brick-and-mortar locations and offering delivery from a central kitchen B. raising prices without improving on the quality of food C. marketing itself as a high-end restaurant and competing with more refined restaurants in the area D. lowering the quality of ingredients below what customers expect to control costs
Chord Guitars Inc sells guitars and other stringed instruments to consumers. A Chord salesperson says to a potential customer, "This Chord is the best guitar you'll find anywhere, even online." This statement is A) an implied warranty of fitness for a particular purpose
B) an implied warranty of merchantability. C) an express warranty. D) puffery.
The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages
What will be an ideal response?