Exam 6: Intellectual Property
Exam 1: An Overview of Ethics85 Questions
Exam 2: Ethics for It Workers and It Users75 Questions
Exam 3: Computer and Internet Crime89 Questions
Exam 4: Privacy90 Questions
Exam 5: Freedom of Expression90 Questions
Exam 6: Intellectual Property90 Questions
Exam 7: Software Development75 Questions
Exam 8: The Impact of Information Technology on Productivity and Quality of Life90 Questions
Exam 9: Social Networking90 Questions
Exam 10: Ethics of It Organizations90 Questions
Select questions type
Competitive intelligence analysts must be authorized to take unethical or illegal actions in the normal course of their job.
(True/False)
4.7/5
(33)
Copyright law protects authored works such as art, books, and film.
(True/False)
4.8/5
(46)
The main body of law that governs patents is contained in Title 35 of the U.S. Code.
(True/False)
4.8/5
(43)
Cross-licensing agreements between organizations allow each party to sue the other over patent infringements.
(True/False)
4.8/5
(35)
To obtain a U.S. , an application must be filed with the USPTO according to strict requirements.
(Short Answer)
4.7/5
(39)
A claims as its invention some feature or process embodied in instructions executed by a computer.
(Multiple Choice)
4.7/5
(38)
The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.
(True/False)
4.9/5
(34)
Merchants seeking trademark protection apply to the if they are using the mark in interstate commerce or if they can demonstrate a true intent to do so.
(Essay)
4.8/5
(36)
A(n) can be used to reveal a competitor's program code, which can then be used to develop a new program
that either duplicates the original or interfaces with the program.
(Short Answer)
4.9/5
(34)
Because organizations can risk losing trade secrets when key employees leave, they often try to prohibit employees from revealing secrets by adding to employment contracts.
(Short Answer)
4.8/5
(41)
The Lanham Act (also known as the Trademark Act) defines the use of a trademark, the process for obtaining a trademark, and the penalties associated with trademark infringement.
(True/False)
4.9/5
(37)
is a term used to describe works of the mind such as art, books, inventions, music, and processes that are distinct and owned or created by a single person or group.
(Short Answer)
4.9/5
(47)
A software developer could make a program simply by putting it into the public domain with no copyright, allowing others to revise the original code.
(Short Answer)
4.9/5
(39)
A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.
(True/False)
4.9/5
(36)
Discuss the uses of cross-licensing agreements by large software manufacturers and how their use can place smaller companies at a disadvantage.
(Essay)
4.8/5
(46)
Copyright and patent protection was established through the , which specifies that Congress shall have the power "to promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Rights to their respective Writings and Discoveries."
(Essay)
4.8/5
(41)
Two software manufacturers could conceivably develop separate programs that perform the same functions in a
nearly identical manner without infringing each other's copyrights.
(True/False)
4.8/5
(47)
The enacted in 1999, allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts.
(Multiple Choice)
4.8/5
(33)
According to the Copyright Term Extension Act signed into law in 1998, for works created after January 1, 1978, copyright protection endures for the life of the author plus .
(Short Answer)
4.7/5
(36)
The U.S. Supreme Court has ruled that there are classes of items that cannot be patented.
(Multiple Choice)
4.9/5
(34)
Showing 61 - 80 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)