Exam 19: Legal and Ethical Aspects

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A _______ for an invention is the grant of a property right to the inventor.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

A

The first comprehensive privacy legislation adopted in the United States was the Privacy Act of 1974.

Free
(True/False)
4.8/5
(33)
Correct Answer:
Verified

True

The copyright owner has which exclusive right(s)?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

D

Anyone can join the Ad Hoc Committee on Responsible Computing.

(True/False)
4.8/5
(35)

The three types of patents are: utility patents,design patents,and ________.

(Essay)
4.8/5
(37)

Land and things permanently attached to the land,such as trees,buildings,and stationary mobile homes are _______.

(Multiple Choice)
4.8/5
(38)

An example of a patent from the computer security realm is the RSA public-key cryptosystem.

(True/False)
4.9/5
(31)

The successful use of law enforcement depends much more on technical skills than on people skills.

(True/False)
4.9/5
(37)

The U.S.legal system distinguishes three primary types of property: real property,personal property,and _________ property.

(Essay)
4.8/5
(35)

No cybercriminal databases exist that can point investigators to likely suspects.

(True/False)
4.9/5
(37)

A servicemark is the same as a trademark except that it identifies and distinguishes the source of a service rather than a product.

(True/False)
4.9/5
(35)

The right to seek civil recourse against anyone infringing his or her property is granted to the ________.

(Essay)
4.8/5
(31)

The purpose of the privacy functions is to provide a user protection against discovery and misuse of identity by other users.

(True/False)
4.9/5
(33)

The invasion of the rights secured by patents,copyrights,and trademarks is ________.

(Essay)
4.7/5
(32)

________ is a method for minimizing exposure of individual information while enabling continuous analysis of potentially interconnected data.

(Multiple Choice)
4.9/5
(33)

The relative lack of success in bringing cybercriminals to justice has led to an increase in their numbers,boldness,and the global scale of their operations.

(True/False)
4.9/5
(33)

The Common Criteria specification is primarily concerned with the privacy of personal information concerning the individual rather than the privacy of an individual with respect to that individual's use of computer resources.

(True/False)
4.9/5
(38)

_____ strengthens the protection of copyrighted materials in digital format.

(Multiple Choice)
4.9/5
(33)

A ______ handles the financial transaction for issuing the digital license to the consumer and pays royalty fees to the content provider and distribution fees to the distributor accordingly.

(Essay)
4.8/5
(28)

_______ refers to a system of moral principles that relates to the benefits and harms of particular actions,and to the rightness and wrongness of motives and ends of those actions.

(Essay)
4.8/5
(33)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)