Exam 4: Intellectual and Intangible Property
Exam 1: Critical Reasoning and Moral Theory49 Questions
Exam 2: Computing Professions and Professional Ethics50 Questions
Exam 3: Privacy50 Questions
Exam 4: Intellectual and Intangible Property50 Questions
Exam 5: Trust, Safety, and Reliability50 Questions
Exam 6: How Computing Is Changing Who We Are50 Questions
Exam 7: Democracy, Freedom of Speech, and Freedom of the Press50 Questions
Exam 8: Computing and Vulnerable Groups50 Questions
Exam 9: Autonomous and Pervasive Technology50 Questions
Select questions type
Plagiarism necessarily implies copyright infringement.
Free
(True/False)
4.8/5
(32)
Correct Answer:
False
What does the text describe as a major controversy surrounding software patents and algorithms?
Free
(Essay)
4.8/5
(30)
Correct Answer:
One of the major controversies surrounding software patents has to do with the question of whether or not a patent can be used to protect an algorithm. It is not possible to patent a basic mathematical fact. On the other hand, some algorithms seem like genuine inventions.
Match each term with the correct statement below.
-the most common peer-to-peer file-sharing protocol used today
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
I
____ makes price discrimination in the sale of DVDs based on geography much easier.
(Multiple Choice)
4.9/5
(38)
Intellectual property laws are required to protect trade secrets.
(True/False)
4.8/5
(27)
Match each term with the correct statement below.
-involves the look and feel of a product or its packaging
(Multiple Choice)
5.0/5
(38)
____ is a program that removes the copy protection from DVDs.
(Multiple Choice)
5.0/5
(29)
Any company that makes a DVD or Blu-Ray player is obligated to include ____________________ technology, which prevents the user from playing videodiscs from other parts of the world.
(Short Answer)
4.9/5
(27)
____ infringement occurs when an infringement committed by another person would not have happened without your help.
(Multiple Choice)
4.8/5
(36)
The sites that provide search functionality for BitTorrent are called ____ sites.
(Multiple Choice)
5.0/5
(31)
Which of the following is NOT protected by copyright in the United States?
(Multiple Choice)
4.8/5
(39)
When you purchase content for devices protected by ____________________, the content is often locked so that it can only be used on your device.
(Essay)
4.9/5
(38)
U.S. copyright law specifically allows us to make ____ of copyrighted works without permission.
(Multiple Choice)
4.8/5
(30)
Match each term with the correct statement below.
-the main mechanism for protecting creative works
(Multiple Choice)
4.7/5
(49)
Computer security experts and hackers are often able to decrypt material and produce a version that is usable on any device; to prevent this, the U.S. Congress passed a law in 1998 called the ____
(Multiple Choice)
4.9/5
(34)
A(n) ____ is a legally registered word, phrase, symbol, or other item that identifies a particular product, service, or corporation.
(Multiple Choice)
4.9/5
(33)
The term ____ refers to a collection of technologies that work together to ensure that copyrighted content can be viewed only by the person who purchased it.
(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)