Exam 6: Intellectual Property
Exam 1: An Overview of Ethics85 Questions
Exam 2: Ethics for It Workers and It Users85 Questions
Exam 3: Computer and Internet Crime90 Questions
Exam 4: Privacy95 Questions
Exam 5: Freedom of Expression90 Questions
Exam 6: Intellectual Property90 Questions
Exam 7: Software Development90 Questions
Exam 8: The Impact of Information Technology on Productivity and the Quality of Life90 Questions
Exam 9: Social Networking85 Questions
Exam 10: Ethics of It Organizations85 Questions
Select questions type
According to the Copyright Term Extension Act signed into law in 1998, for works created after January 1, 1978, copyright protection endures for the life of the author plus ____________________.
or
(Short Answer)
4.9/5
(31)
Art, architecture, graphics, and sculptures cannot be copyrighted.
(True/False)
4.8/5
(36)
Software has sometimes been treated as the expression of an idea, which can be protected under ____________________ law.
(Short Answer)
4.9/5
(35)
A standard is a(n) ____________________ that has been approved by a recognized standards organization or accepted as a de facto standard with a particular industry.
(Short Answer)
4.9/5
(39)
A devious patent holder might influence a standards organization to make use of its patented item without revealing the existence of the patent. Later, the patent holder might demand royalties from all parties that use the standard. This strategy is known as ____________________.
(Short Answer)
4.9/5
(44)
____ can qualify for trade secret protection under the Uniform Trade Secrets Act.
(Multiple Choice)
4.8/5
(39)
Cybersquatters are individuals who registered domain names for famous trademarks or company names to which they had no connection.
(True/False)
4.8/5
(37)
A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.
(True/False)
4.9/5
(35)
A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators.
(True/False)
4.9/5
(31)
One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is ____.
(Multiple Choice)
4.8/5
(38)
Works that have not been fixed in a tangible form of expression and those that consist entirely of common information that contains no original authorship are ____________________ for copyright protection.
(Short Answer)
4.8/5
(38)
The basic premise behind open source code is that when many programmers can read, redistribute, and modify a program's code, the software ____.
(Multiple Choice)
4.8/5
(40)
Publishing a description of its innovation to establish an idea's legal existence as prior art is called ____________________.
(Short Answer)
4.8/5
(50)
Some software experts think that too many software patents are being granted, inhibiting new software development. For example, ____ obtained a patent for "one-click shopping," based on the use of a shopping cart purchase system for electronic commerce.
(Multiple Choice)
4.9/5
(28)
____________________ is a term used to describe works of the mind such as-art, books, inventions, music, and processes-that are distinct and owned or created by a single person or group.
(Short Answer)
4.7/5
(32)
The fair use doctrine allows portions of patented materials to be used with permission under certain circumstances.
(True/False)
4.9/5
(46)
The concept that an idea cannot be copyrighted but the ____ of an idea can be is key to understanding copyright protection.
(Multiple Choice)
4.8/5
(37)
A(n) ____________________ can read the machine language of a software program and produce the source code.
(Short Answer)
4.8/5
(30)
The _____________________________________________ created the World Trade Organization.
or
or
or
(Short Answer)
4.8/5
(35)
Showing 21 - 40 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)