In the Junger v. Daley case referenced in the text, a professor challenged regulations involving the posting to a website of human readable source code of an encryption software program. The court held that:
a. computer source code is not protected by the First Amendment.
b. computer source code is protected by the First Amendment and that restrictions involving restrictions to such code are reviewed under a rational basis standard.
c. computer source code is protected by the First Amendment and that restrictions involving restrictions to such code are reviewed under the substantially related test.
d. computer source code is protected by the First Amendment and that restrictions involving restrictions to such code are reviewed under a strict scrutiny standard.
c
You might also like to view...
All of the following below are needed for the calculation of straight-line depreciation except:
A) cost. B) salvage value. C) useful life. D) units produced.
Which of the following is an (are) objective(s) of ratio analysis?
A. Assessing the prospects for future performance. B. Analyzing how a company finances its operations. C. Assessing past performance. D. All of these answers are correct.
The U.S. Mine Safety Administration conducts searches of certain businesses. This agency and other administrative agencies can conduct warrantless searches in
A. all industries. B. highly regulated industries. C. no industries. D. newly regulated industries only.
One purpose of financial statement analysis for internal users is to provide strategic information to improve company efficiency and effectiveness in providing products and services.
Answer the following statement true (T) or false (F)