CGS1060C

¡Supera tus tareas y exámenes ahora con Quizwiz!

What two ways can reduction to practice occur?

"Actual reduction ot practice" occurs when the invention in built an tested. "Constructive reduction to practice" occurs with the filing of a patent application tthat meets the statutory requirements.

What are the four main components of PIPA (Protect Internet Protocol Act) and SOPA (Stop Online Privacy Act)?

1. Cut off ISP 2. Stop payment processors 3. Stop illegal ads 4. Force filters on search engines

In the Web address www.facebook.com, Facebook is the top-level domain

False

Web-based databases are being used to help investigators solve criminal cases

True

Web-based databases are being used to help investigators solve criminal cases. True or False

True

________ microphones pick up sound from only one direction.

Unidirectional

1111

What is the binary representation of the number 15?

Firewire

What is the name of Apple Inc.'s name for the IEEE 1394 High Speed Serial bus?

The Internet is ________.

a large network of networks

Define fair use

a limitation and exception to the exclusive right granted by copyright law to the author of a creative work. In United States copyright law, fair use is a doctrine that permits limited use of copyrighted material without acquiring permission from the rights holders.

Define Process in relation to patents

a process, art or method, and includes a new use, primarily of industrial or technical processes.

Search engines have which three parts?

a spider, an indexer, and search engine software

________ computing relates to emotion or deliberately tries to influence emotion. a. Affective b. Personal c. Psychological d. Emotional

a. Affective

Spam*

electronic junk mail

A digicam sits on your computer monitor and is used primarily ofr transmitting live video.

false

A full software installation enables you to choose which features you want installed on your hard drive.

false

A study by the National Research Council concludes that by the year 2030, computers will displace humans in 85 percent of the current occupations.

false

A typical CD stores between 10-15 songs in uncompressed format but 300-400 in MP3 format.

false

Light-emitting diode technology uses organic compounds that produce light when exposed to an electric current.

false

Affecive computing is a field of study focused on managing and processing information and the automatic retrieval of information.

false

The area that holds all of the instructions the computer needs to start up is RAM.

false

All Web-based software is free.

false

Angel is a gaming software.

false

Social networking

is incorporated as part of political strategy by many politicians.

Software

set of computer programs that tells computer what to do and enables it to perform different tasks

Monitor screen grids are made up of millions of pixels, with each pixel containing ________ subpixels of colors.

three

How do we connect in the technology age?

through music, there are new ways with Google Street View (apply music with pictures to evoke emotional memories) and now we report the news (DYTHR)

Desktop publishing software enables you to create brochures and flyers.

true

Proprietary software is applications that you must purchase.

true

The most common compressed digital format is MP3.

true

VeriMed can be used to keep Alzheimer patients safe.

true

When purchasing video-editing software, you should purchase the least expensive application with the greatest number of supported file formats.

true

A Web site that allows anyone to add or edit content is called a ________.

wiki

Psychology and Technology

working to develop computers that can respond to human emotional expression and to have computers have emotional and social skills affective computing

Secure Online Shopping

1) The beginning of the URL changes from Http to https 2) The site displays a seal from a reputable third-party web security company 3) A small icon of a closed padlock appears on the toolbar 4) Use your common sense and shop at well-known, reputable sites.

What is a U.S. Trademark

a word, name, symbol or device that it identifies and distinguishes the source of a service orther than that of a product that is performed by one person for the benefit of a person or persons other than himself, either for pay or otherwise.

Social media

is incorporated as part of a political strategy by many politicians

The difference between people with access to computers and the Internet and those without this access is known as the ________.

digital divide

Multimedia tours using mobile devices and wireless technology are not common in museums and galleries at this time.

false

You cannot be called computer literate unless you have knowledge of higher level computer skills, such as computer programming.

false

You cannot be computer literate unless you have knowledge of higher level computer skills, such as computer programming.

false

What Is Patentable?

"[w]hoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title." - to be patentable, an invention must be novel, useful, and not obvious in light of current technology. - Plants that are reproduced asexually (by means other than from seed), such as hybrid or genetically engineered plants, are patentable in the United States, as are genetically engineered (or cloned) microorganisms and animals.

Web 2.0 has led to a shift from just consuming content toward

producing content

Elements of a Parody Defense

-A host work which the target audience recognizes; -A derivative work which is transformative and -Parodies the host work; -The creator of the derivative work uses only as much of the host work to bring to mind that work; and -No likelihood of significant market harm.

A(n) ________ is a device that looks like a skinny pen but has no ink.

stylus

External hard drives are often used to back up data that is contained on the internal hard drive.

true

If you draw a watch-sized circle on your wrist, SixthSense will display an analog watch face on your arm.

true

If you post a picture on your own social networking site, it could become available to the public via search engines.

true

In reference to URLs, domain name and host name are used interchangeably.

true

In reference to URLs, the domain name identifies the sites host.

true

Information technology is the study of managing and processing information, and the automatic retrieval of information.

true

Information technology is the study of managing and processing information, and the automatic retrieval of information. false or true

true

Joysticks and steering wheels are examples of game controllers.

true

Keyboards that display on screen when input of text is required are known as virtual keyboards.

true

Mastery of software programs such as Adobe Illustrator and Corel Painter is essential to creating digital art.

true

Mastery of software programs, such as Adobe Illustrator and Corel Painter, is essential to creating digital art,

true

Mastery of software programs, such as Adobe Illustrator and Corel Painter, is essential to creating digital art. true or false

true

Modern printers feature Bluetooth connectivity technology.

true

Most webcasts are not updated automatically.

true

Most word processing programs come with a search and replace tool that enables you to locate and replace specific text.

true

On a keyboard, Num Lock and Caps Lock are both toggle keys.

true

One of the new capabilities of PowerPoint 2010 enables you to trim video clips without a separate video-editing program.

true

OpenOffice.org is an example of open source software.

true

Processing is manipulating, calculating, or organizing data into information.

true

Serial ports and parallel ports have long been used to connect input and output devices to the computer

true

Serial ports and parallel ports have long been used to connect input and output devices to the computer.

true

Social networks are often used to advertise job openings.

true

Software as a Service (SaaS) is a Web-based application.

true

Some applications and operating systems allow you to program a series of tasks and associate that series of tasks with specific set of keystrokes.

true

VeriMed can be used to keep Alzheimer patients safe. true or false

true

ineligible trademarks

-Someone already owns it -Descriptive (and no secondary meaning) -Misdescriptive (AND customers likely to believe the misdescription) -"Primarily merely" surnames or geographic (unless the name has acquired secondary meaning) -"Immoral, deceptive or scandalous"

what trademark is protected by

-State common law -State statutes -Federal statute (Lanham Act)

copyright rights

-Use -Copy -Distribute -Display and perform the work publicly -Transmit digitally -Create derivative works -Prohibit above actions

Retroactivity? Analytical framework for copyrighting something in public domain.

1. Foreign country copyright 2.in PD b/c failure to comply w/ formalities 3. Author in elgible country 4. work first published in elgible country (or 30days)

What are 7 types of intellectual property protected under and the uses and rights of the owner are defined by appropriate state, federal and international laws?

1. Inventions 2. works of authorship 3. Trade secretes 4. Trademarks 5. Service Marks 6. Plant Patents 7. Mask works

Patent statute limits the patentable subject matter by excluding what three things?

1. Laws of Nature 2. Physical phenomena 3. Abstract Ideas

What 3 Conditions are needed for Fair Use?

1. Only applies in special cases 2. Can't conflict w/ normal exploitation of work 3. Cannot unreasonably prejudice legit interests of right's holder

The Virtual Choir showed that people have the means to collaborate easily internationally. (T/F)

True

The hard drive is an example of a nonvolatile storage device.

True

The information in e-mail is no more private than a postcard

True

The move toward access instead of ownership is a sign of collaborative consumption.

True

The move toward access instead of ownership is a sign of collaborative consumption. True or False

True

The move toward access instead of ownership is a sign of collaborative consumption. (T or F)

True

There are sites that host blogs free of charge.

True

True or false The move toward access instead of ownership is a sign of collaborative consumption

True

True or false Virtual reality is the addition of info-graphics to your visual field

True

Virtual reality is the addition of graphical information to your visual field. True or False

True

Web-based databases are being used to help investigators solve criminal cases. (T or F)

True

What are five advantages to registering a Copyright?

1. Registration establishes a public record of the copyright claim. 2. Before an infringement suit may be filed, registration is necessary for works of U.S. Origin. 3.If registration is made within 5 years of publication, registration will establish prima facie evidence in court of the validity of the copyright and of the facts stated in the registration certificate. 4. If registration is made within 3 months after publication of the work or prior to an infringment of the work, statutory damages and attorney fees will be available to the copyright owner in court actions for infringement . Otherwise, only an award of actual damages and profits is available to the copyright owner. 5. Registration allows the owner of the copyright to record the registration with the U.S. Customs Service for protection against the importation of infringing copies.

What should an invention disclosure report contain?

1. The identification of the funding source 2. The inventors 3. Sufficient technical detail about the invention 4. Any publication or other public use that might impact patentability. 5. The inventive periods 6. Other sources of funding or materials

What case shows that the primary purpose of copyright is to promote science and useful arts- not rewarding labor?

Feist (phone books case)

Social media

is incorporated as part of a political strategy by many politicians.

How are arts and computers related?

need to know how to manage a website for selling your art. new experiences for audiences such as dance movements that are computer generated. Mastery software suchas Adobe Illustrator and photoshop is essential for creating digital art

A ________ enables your computer to connect to other computers or to the Internet.

network interface card (NIC)

What is the requirement for originality in Canada?

no creativity needed, BUT need exercise skill and judgment

Khan Accademy

nonprofit website that has videos to teach students. Also has automated testing following each video series so students can try similar problems until show mastery. teacher can follow what is happening in the classroom too so knows how exactly to help students

The hard drive is a ________ storage device, meaning that it stores data permanently even when the computer is turned off.

nonvolatile

Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.

plug-ins

Define Manufacture in terms of patents

refers to articles that are made, and includes all manufactured articles

Intellectual Property

refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.

Software

refers to the commands that instruct a computer what to do

Define "composition of matter" under patent law

relates to chemical compositions and may include mixtures of ingredients as well as new chemical compounds. Software, business methods, and life forms have been found to be patentable subject matter.

Social Networking*

the gathering together of groups of people using online tools to connect and exchange ideas

Computer programs can add muscles, fat, and skin to recovered human skulls to help identify the victim.

true

Computer systems fun at speeds measured in gighertz.

true

Computers work exclusively with numbers.

true

Coordinated colors and styles in a word processing program is known as a theme.

true

Dancers can be wired with light electronic sensors so that their movements can be digitized for computer analysis.

true

Dancers can be wired with light electronic sensors so that their movements can be digitized for computer analysis. true or false

true

Data mining is the process of searching huge amounts of data with the hope of finding a pattern.

true

Data mining is the process of searching huge amounts of data with the hope of finding a pattern. true or false

true

Data mining is the process of searching large datasets to find patterns.

true

Embedded computers have their own programming. They typically do not receive input from you, nor do they interact with other systems

true

Examples of information technology careers are telecommunication and software deployment.

true

Examples of information technology careers are telecommunication and software deployment. true or false

true

External hard drives are often used to back up data that are contained on the internal hard drive.

true

Information technology is the study of managing and processing information, and the automatic retrieval of information. true or false

true

Some art museums use technology to let you download informational podcasts to listen to while touring exhibits.

true

Some art museums use technology to let you download informational podcasts to listen to while touring the exhibits. true or false

true

Tagging enables you to share your favorite Web site with others.

true

The Internet can be said to be a result of the Cold War.

true

The Internet is the largest computer network in the world.

true

The Microexpression Training Tool software trains law enforcement officials to distinguish true emotion from deception.

true

The National Center for the Analysis of Violent Crime database enables detectives to analyze information about similarities between crimes.

true

The National Center for the Analysis of Violent database enables detectives to analyze information about similarities between crimes.

true

The central processing unit controls all the functions performed by the computer's other components and processes all the commands issued to it by software instructions.'

true

The connectivity port that uses a standard phone line connection is the modem port.

true

The front end of cloud computing is the side we see as users.

true

The operating system provides the means for users to interact with a computer.

true

The primary benefit of spreadsheet software is its capability to automatically recalculate formulas and functions.

true

There are free blog hosting sites.

true

Trillian and Digsby are universal chat services that you install on your computer so that you can chat with users of all popular IMs.

true

USB ports are causing serial and parallel ports to become legacy technology.

true

Understanding how to use e-mail effectively is one example of what it means to be computer literate.

true

Webcasts can be used to initiate a response from a viewing audience.

true

Weblogs or blogs are public, allowing anyone to view them.

true

When evaluating a Web site, testing the relevancy of a site means checking to see if the information in the site is current.

true

When evaluating a Web site, testing the relevancy of a site means checking to see whether the information in the site is current.

true

When using Windows 7 power management tools, you really only need to shut down your computer when you need to repair the system, install hardware, or move the system.

true

With a client-based e-mail account, such as Microsoft Outlook, you are able to view your e-mail only from the computer on which the client program is installed.

true

Word processing software enables you to easily change the appearance and organization of your documents.

true

You can use a word processing program to translate words or phrases to another language.

true

Computer technology is used in the arts by

creating web pages to advertise and sell art. creating multimedia museum tours. integrating it into new works of performance art.

________ is described as the ability of the world's populace to volunteer and collaborate on large projects.

creative surplus

Stop Counterfeiting in Manufactured Goods Act (SCMGA)

enacted by congress in 2006 to combat counterfeit goods - The act made it a crime to intentionally traffic in, or attempt to traffic in, counterfeit goods or services, or to knowingly use a counterfeit mark on or in connection with goods or services. - Before this act, the law did not prohibit the creation or shipment of counterfeit labels that were not attached to any product. Therefore, counterfeiters would make labels and packaging bearing a fake trademark, ship the labels to another location, and then affix them to inferior products to deceive buyers. The SCMGA closed this loophole by making it a crime to traffic in counterfeit labels, stickers, packaging, and the like, whether or not they are attached to goods.

service mark

essentially a trademark that is used to distinguish the services (rather than the products) of one person or company from those of another. - For instance, each airline has a particular mark or symbol associated with its name. - Titles and character names used in radio and television are frequently registered as service marks.

Ushahidi

example of crisis mapping tool. Developed In Kenya when a Okolloh was overwhelmed with messages about the violence. Later SwiftRiver was developed which rates the submissions and quality of info for accurateness.

Cognitive surplus means that we now find many people with

excess time and free tools for collaboration

Used to add enhanced sound and video to a computer

expansion card

What is the requirement for originality in France?

expresses author's personality

Digestible microchips

have embedded sensors to transmit information to physicians.

The Internet backbone refers to ________.

he main pathway of high-speed communications lines through which all Internet traffic flows

The CPU is often covered by a(n) BLANK, which dissipates the heat generated by the chip.

heat sink

software*

instructions that tell your computer what to do. install the right ones to avoid online annoyances

Autonomy

working without continual direction and control

Microsoft's spreadsheet software is called Calc.

false

One bit is equal to eight bytes.

false

Restarting the computer while it's powered on is called a cold boot.

false

SixthSense is a wearable device that consists of a camera, projector, and a mirror that can communicate with the Internet over wireless Bluetooth via a computer.

false

System software is the software you use to do tasks at home, school, or work.

false

The # sign can be used as a wildcard when conducting searches with most search engines.

false

The Google search engine can process more than 3 petabytes of user-generated data per hour.

false

The Internet protocol used to upload and download files is HTTP.

false

The Internet was developed to ensure faster delivery of communications such as mail.

false

The first no-glasses 3-D laptop was introduced in late 2011 by Dell.

false

The for-profit Khan Academy contains over 2,200 videos, and over 1 million students a month use the site.

false

The menuboard of the Khan Academy shows exactly which topic a student has mastered and where they are failing to progress. Answer

false

The motivation behind discount cards offered by grocery stores and drugstores is to encourage customers to frequent their stores.

false

The primary use for the Internet is searching.

false

The unique address for a particular Web site is the domain name.

false

There are virtually no privacy risks in using today's newest social networking sites.

false

Using your mobile devices to make purchases is more risky than making purchases with your computer on the Web.

false

Web 2.0 is classified as passively browsing Web pages created for us.

false

Web-based e-mail programs are usually more full featured than client-based e-mail systems.

false

When a job is sent to other countries, as many programming jobs have been, it is said to have been data mined.

false

When a job is sent to other countries, like many programming jobs have been, it is said to have been data mined.

false

When performing data entry, you cannot use the numeric keypad on your keyboard to enter numeric values.

false

When shopping on the Web, it is better to pay for your purchase with a debit card rather than a credit card.

false

When uninstalling software, it is best simply to open the Explorer window and delete the folder containing the software.

false

Wikipedia is a good source for a research paper.

false

You cannot be computer literate unless you have knowledge of higher level computer skills, such as computer programming. true or false

false

ZipCar is an example of ownership.

false

ZipCar is an example of ownership. true or false

false

Computer Literate

familiar enough with computers that you understand their capabilities and limitations and know how to use them efficiently

Being computer literate means you know how to solve any computer problem. (T/F)

False

The largest storage space in your computer is provided by the

hard drive

Any computer parts that you can actually touch are considered to be ________.

hardware

Data mining

important now because it is so easy to gather enormous data sets, the study of data using algorithms to detect patterns, the translation of Big data sets into meaningful information

Data mining is

important now because it is so easy to gather enormous data sets. the translation of Big Data sets into meaningful information. the study of data using algorithms to detect patterns.

Fanciful trademarks

include invented words, such as Xerox for one manufacturer's copiers and Google for search engines.

Social media has been used to

increase communication between elected officials and their constituents, replace television and radio advertising in political elections, increase voter turnout in elections

Social media has been used to

increase communication between elected officials and their constituents. increase voter turnout in elections. replace television and radio advertising in political elections.

Collaborative consumption is when people get together to

increase the use of a single product by sharing access to it

Collaborative consumption is when people get together to

increase the use of a single product by sharing access to it.

studies reveal that human motivation is fostered by

increasing levels of mastery, ability to self direct, and directing your work toward a higher goal than just your own needs

IT is the abbreviation for

information technology

A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer

input device

Hardware

Computer printers and other devices

Studies reveal that human motivation is fostered by

All of the above

STLYUS

An input device that looks like a pen but has no ink

HARDWARE

Any part of the computer that you can physically touch

What feature is a list of pages you've visited within a Web site?

Breadcrumb trail

Ushahidi

Crisis Mapping Tool

TRUE

Current computer systems run at speeds measured in gigahertz (GHz).

HTTP is the abbreviation for ________.

Hypertext Transfer Protocol

IT is the abbreviation for

Information Technology

What is a Gigabyte

One billion bytes

Is incorporated as part of a political strategy by many politicians

Social Media

Web 2.0

Tools and web-based services that emphasize online collaboration and sharing among users

video expansion card

Video ports are found on the __________.

Hard drive

Which device has the largest storage space in a computer?

Researchers believe that microchips may one day

be able to restore sight to the blind

Inkjet printers and laser printers are examples of ________ printers.

nonimpact

what can forecast tornadoes within minutes?

supercomputers

What can be Copyrighted?

-"Original works of authorship"; need the element of creativity, even if slight -Only the expression is protected

TRUE

An example of a connectivity port is an Ethernet port.

What treaty deals with Copyright?

Berne (1886)

________ is data that has been organized or presented in a meaningful fashion.

Information

Examples of crowdfunding and crowdsourcing include

KIckstarter and MobileVoice.

How long is US copyright?

Life of author + 70 years?

BYTE

One character of data

Which is NOT important to consider when buying a printer?

Paper

All the following are examples of input devices EXCEPT a ________.

Printer

What does SOPA stand for?

Stop Online Privacy Act

Recognition/Enforcement of Foreign Judgments? (Which factors?)

(1) Does foreign court have jurisdiction? (2) Was D. properly served? (3) Was there fraud? (4) foreign judgment against public policy

For a U.S. patent to be "novel" the invention must , prior to filing of a patent application be?

(a) Not known or used by others in the U.S or (b) patented or described in a printed publication.

Requirements for Trademark

-Distinctive -Used in commerce -Used in interstate commerce, for federal law protection

requirements for copyright

-Element of creativity in the host work -Copying of the expression, not just of the facts. This means that works of fiction are more thoroughly protected than factual accounts. -Whether the work has both copyrightable and non-copyrightable elements. -Fixed in a "tangible medium of expression" "now known or later developed" -Work is fixed if: it "can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device."

levels of distinction

-Generic: No TM - you can't control the ordinary word for a product -Descriptive: Only if it acquires secondary meaning- consider whether consuming public primarily associates that mark with a particular producer. -Suggestive: Evokes or suggests a characteristic of the underlying good. -Arbitrary or fanciful: Word has no logical relationship to underlying product.

Trade secret

-Information not generally known or readily ascertainable; -Developed through some investment by the owner/plaintiff; -That provides a firm with competitive advantage; -Owner/plaintiff takes reasonable steps to keep it secret; and -Defendant discovers the secret through improper means.

Remedies for trademark

-Injunction -Damages (D's profits; P's loss; possibly costs of suit and treble damages) -For dilution, damages only available if D willfully traded on P's goodwill (but still can get injunction)

Remedies for copyright infringement

-Injunction -Statutory Damages -Plaintiff's Damages (amt plaintiff lost) -Defendant's Profits -Impoundment (and eventual destruction) -Criminal penalties -Attorney's fees

Elements of a fair use defense

-Nature of the host work (original=fact-based) -Is the derivative work transformative? -How much of the host work was used? -Effect of the derivative work on potential market for or value of the host work -Defendant's motive -First Amendment implication

Dilution

-Used when there is no competition between the parties and consumers are not likely to be confused about the origin of goods (but really remote goods - "lipstick and steamshovels" makes a claim less compelling) -Protects the reputation and goodwill value of the trademark -Three protected interests: Right of the prior user to enter a related field (expansion doctrine); Right to protect its reputation from (likely) association with inferior goods ("tarnishment"); and Right of the public to be free from (likely) confusion between the marks ("blurring").

elements for copyright infringement

-You own the valid copyright to the work (elements you claim were infringed) -The works are materially similar (so that an average observer would see that) -The defendant copied from your copyrighted work -The defendant used one of your copyright rights without your permission

fair use: trademark

-affirmative defense against trademark infringement/dilution -Nominative use; -Comparative advertising; -News reporting; -Parody.

Trademark Infringement

-plaintiff owns a valid mark -defendant used it or a similar symbol in connection with the sale, offering for sale, distribution or advertising of good or services and -the use caused likelihood of confusion, mistake or deception about the origin, sponsorship or approval of the goods or services.

What are the 37 CFR Part 401 provisions?

1. The institution has a written agreeement with its researchers, including student, requiring disclosure and assignment of any subject invention. 2. The institution discloses the invention to the funding agnecy within a reasonable time after it becomes known to the institution. 3. Within two years of disclosure to the funding agency, and prior to the expiration of any statutory patent filing period, the institution files with the fuding agency a written election to take title to the patent.

What are the three types of patents?

1. Utility Patent 2. Design Patent 3. Plant Patent

What are the two types of U.S. patent applications?

1. non-provisional or full patent application 2. provisional patent application

International Protections

1. the Berne Convention 2. the Trade-Related Aspects of Intellectual Property Rights (known as the TRIPS agreement) 3. the Madrid Protocol 4. the Anti-Counterfeiting Trade Agreement

If a copyright notice is used what should it contain?

1. the copyright symbol or the word "Copyright" or the abbreviation "Copr" 2. the year of first publication of the work: and the name of the owner of the copyright.

How many countries are members of TRIPS?

153

Autonomy

1st factor that leads to greater motivation

Purpose

2nd factor that leads to greater motivation

Mastery

3rd factor that leads to greater motivation

What are the 37 CFR Part 401 provisions?

4. Within one year of election to take title or sooner if necessary to obtain valid patent protection, the institution files a patent application. In the case of biological materials, the NIH has crated an alternative process that allows the institution to retain title without filing a patent application. 5. The institution shares royalties with the inventor

What are the 37 CFR Part 401 provisions?

6. The institution devotes any net revenue fromt he intention to the suport of scientific research or education. 7. Certain provisions of theAct have direct implications for what may be offered to an industrial sponsor of research. 8. If the institution declines to take title to the subject invention or fails to follow the provisions of the Act, the funding agnecy may elect to takke title to the patent or may agree to vest title in the inventor.

How long does copyright protection last for jointly authored works?

70 years after the last surviving author's death.

What are the 37 CFR Part 401 provisions?

9. The institution may not unilaterally assign its rights to the invention to anyone except an entity that specializes in the managment of inventions. 10. Research projects entirely funded by a non-governmental sponsor are exempt from Bayh-Dole: however, reserach projects partially funded by a Federal grant are governed by the Act. 11. The government retains a rotyalty-free, non-exclusive license for government purposes. There is a preference for licenses to small business and, for exclusive licenes, U. S. manufacturers.

How long does copyright protection last for works authored as a result of a written contract or made-for-hire, anonymous or pseudonymous works?

95 Years from publication or 120 years from creation, whichever time period is shorter.

Distinctiveness of the Mark

A central objective of the Lanham Act is to reduce the likelihood that consumers will be confused by similar marks. - For that reason, only those trademarks that are deemed sufficiently distinctive from all competing trademarks will be protected. - In addition, a trademark may not be derogatory to a person, institution, belief, or national symbol. - example: A controversial issue in trademark law has to do with the use of slang terms for American Indians, such as "redskins" and "braves." Many Native Americans find the use of these names offensive.

Augmented Reality

A combination of our normal sense of the objects around us with an overlay of information displayed

Augmented Reality

A combination of our normal sense of the objects around us with an overlay of information displayed.

binary digit (bit)

A digit that corresponds to the on and off states of a computer's switches. A bit contains a value of either 0 or 1.

trademark

A distinctive word, symbol, or design that identifies the manufacturer as the source of particular goods and distinguishes its products from those made or sold by others. - At common law, the person who used a symbol or mark to identify a business or product was protected in the use of that trademark. - by using another's trademark, a business could lead consumers to believe that its goods were made by the other business.

What is a Copyright?

A form of protection that is provided for under the U.S. constitution to the authors of an "original work of authorship: that is in a tangible form.

trade secret

A formula, device, idea, process, or other information used in a business that gives the owner a competitive advantage in the marketplace. The law of trade secrets protects some business processes and information that are not or cannot be protected under patent, copyright, or trademark law against appropriation by a competitor. information of commercial value Trade secrets may include customer lists, plans, research and development, pricing information, marketing techniques, and production methods—anything that makes an individual company unique and that would have value to a competitor. there are no registration or filing requirements for trade secrets, trade secret protection may be well suited for software.) Of course, the secret formula, method, or other information must be disclosed to some persons, particularly to key employees. Businesses generally attempt to protect their trade secrets by having all employees who use the process or information agree in their contracts, or in confidentiality agreements, never to divulge it.

mainframe

A large, expensive computer that supports hundreds of users simultaneously is a(n) __________.

collective mark

A mark used by members of a cooperative, association, union, or other organization to certify the region, materials, mode of manufacture, quality, or other characteristic of specific goods or services. - Collective marks appear at the end of a movie's credits to indicate the various associations and organizations that participated in making the movie. The labor union marks found on the tags of certain products are also collective marks.

Social Networking

A means by which people use the Internet to communicate and share information among their immediate friends, and meet and connect with others through common interests, experiences, and friends.

Social Networking

A means by which people use the internet to communicate and share information among their immediate friends and to meet and connect with others through common interests, experiences, and friends

trade name

A name that a business uses to identify itself and its brand. - A trade name that is the same as the company's trademarked product is protected as a trademark, and unique trade names are protected under the common law. - Trade names may be protected as trademarks if the trade name is the same as the company's trademarked product—for example, Coca-Cola. - Unless it is also used as a trademark or service mark, a trade name cannot be registered with the federal government. - Trade names are protected under the common law, however. - As with trademarks, words must be unusual or fancifully used if they are to be protected as trade names. - For instance, the courts held that the word Safeway was sufficiently fanciful to obtain protection as a trade name for a grocery chain.

TRUE

A network interface card enables your computer to connect with other computers or to a cable modem to facilitate a high-speed Internet connection.

maintains data even when the computer's power is turned off

A nonvolatile storage device __________.

Skype

A popular Voice over Internet Protocol (VoIP) service

TRUE

A port is a place through which a peripheral device attaches to the computer so that data can be exchanged between it and the operating system.

Business-to-business (B2B)

A portion of e-commerce that consists of businesses buying and selling goods and services to other businesses

Consumer-to-consumer (C2C)

A portion of e-commerce that consists of consumers selling to each other through online auction and exchanges sites

Business-to-consumer (B2C)

A portion of e-commerce where exchanges take place between businesses and consumers-such as the purchases that consumers make at online stores

TRUE

A projector is a device that can project images from your computer on the wall.

patent

A property right granted by the federal government that gives an inventor an exclusive right to make, use, sell, or offer to sell an invention in the United States for a limited time. - a grant from the government that gives an inventor the exclusive right to make, use, and sell an invention for a period of 20 years. - Patents for designs, as opposed to inventions, are given for a 14 year period.

Social commerce

A subset of e-commerce that uses social networks to assist in marketing and purchasing products

FALSE

A surround-sound speaker is a system of speakers and audio processing that envelopes the listener in a 180-degree field of sound.

QR Codes

A technology that lets any piece of print in the real world host a live link to online information and video content.

Crisis Mapping Tool

A tool that collects information from e-mails, text messages, blog posts, and Twitter tweets and maps them, making the information instantly publicly available.

Crisis-mapping tool

A tool that collects information from emails, text messages, blog posts, and twitter tweets and maps them, making the information instantly publicly available

TRUE

A trackpoint device is a small joystick-like nub that enables you to move the cursor with the tip of your finger.

Affective Computing

A type of computing that relates to emotion or deliberately tries to influence emotion.

Affective computing

A type of computing that relates to emotion or that deliberately tries to influence emotion

What doe the Bayh-Dole Act create?

A uniform policy for federal agencies relating to disposition of inventions conceived or reduced to practice under grants, contracts and cooperative agreements for experimental, developmental, or research work.

What do you need to read, send, and organize e-mail from any computer?

A web-based e-mail account

FALSE

A webcam is an example of an output device.

What is a Trademark

A word, name, symbol or device that is used in interstate trade with goods to indicate the source of the goods, their physical commodities, which may be natural,, manufactured or produced and to distinguish them from the goods of others.

tablet PC

A(n) ________ is similar to a notebook computer, but the monitor swivels and folds flat.

USB

A(n) __________ port enables printers and other peripherals to be connected directly to a laptop.

Which of the following is sealed in a protective case so that no dust gets inside? A. Hard drive B. NIC C. Blu-ray drive D. CD

A. Hard drive

Which of the following is the largest storage space? A. Internal hard drive B. Cache memory C. RAM D. CPU

A. Internal hard drive

Examples of crowdfunding and crowdsourcing include A. Kickstarter and ScanLife. B. Bing adn Google. C. Call a Bike and Zipcar. D. Ushahidi and Kiva.

A. Kickstarter and ScanLife.

Sophisticated modeling software is helping international researchers A. increase the pace of research in finding and producing vaccines. B. analyze computer systems to gather potential legal evidence. C. market new types of products to a wider audience. D. create more intricate screenplays and movie scripts.

A. increase the pace of research in finding and producing vaccines.

The BLANK performs all of a PC's arithmetic and logic operations.

ALU

Which of the following is not an Internet protocol

ARPANET

The agency that first began funding the Internet was called the ________.

Advanced Research Projects Agency Network

________ computing relates to emotion or deliberately tries to influence emotion.

Affective

People who do not read emotion easily in others hope for new progress in the field of

Affective Computing

What are Material Transfer Agreements?

Agreements to transfer research tools or data to and from researchers.

Which program can you use when you are taking notes in class?

All of the above: SoundNote, EverNote, and OneNote.

Halo Infant protection system

Allows hospitals to monitor the location of every newborn instantly

Fair Use Doctrine

Allows uses of copyrighted material that contribute to the creation of new work (I.e. a quote from copyrighted material), Fair uses do not require the permission of the copyright holder.

an entire file

An 8-bit binary digit can be interpreted by the computer as all of the following EXCEPT

license

An agreement by the owner of intellectual property to permit another to use a trademark, copyright, patent, or trade secret for certain limited purposes. A revocable right or privilege of a person to come on another person's land. - The party that owns the intellectual property rights and issues the license is the licensor, and the party obtaining the license is the licensee. - A license grants only the rights expressly described in the license agreement. A licensor might, for example, allow the licensee to use the trademark as part of its company name, or as part of its domain name, but not otherwise use the mark on any products or services. Disputes frequently arise over licensing agreements, particularly when the license involves Internet uses.

What is a point-of-attachment?

An author must have some connection with a Berne convention state to trigger protection

The type of computer that might help run your refrigerator or car is:

An embedded computer

FALSE

An embedded computer is an example of a mainframe computer.

What is not protected by copyright law?

Anything that is not in a tangible form, ideas or concepts, lists showing no originality, titles, names, short phrases, slogans, factual information, public domain information, works that contain no originality such as telephone lists, height and weight charts, tape measures and rulers or public domain information, and authored works not fixed in a tangible form.

The "Fair Use" Exception

An exception to liability for copyright infringement is made under the "fair use" doctrine. In certain circumstances, a person or organization can reproduce copyrighted material without paying royalties (fees paid to the copyright holder for the privilege of reproducing the copyrighted material). Section 107 of the Copyright Act provides as follows: T]he fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by [Section 106 of the Copyright Act], for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include— 1. the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; 2. the nature of the copyrighted work; 3. the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and 4. the effect of the use upon the potential market for or value of the copyrighted work.

To add additional ports to your computer, what do you need?

An expansion cord

allow legs to make contact with the sides of the chair

An ideal chair for the workplace does all of the following EXCEPT __________.

What is a patent issued for?

An invention that is "novel" and not known by others

Computer Forensics

Analyzing computer systems to gather potential legal evidence

Where do Patent & Copyright derive their authority?

Art. I Sec. 8 Cl. 8 of Constitution: To promote the progress of science and useful arts, by securing for a limited time to authors and inventors, the exclusive right to their respective writings and discoveries.

Crowdfunding

Asking for small donations from a large number of people, often using the internet; a style of generating capital to start a business through social media

What three things pushes people to apply their free time to projects, for no money?

Autonomy, Mastery, and Purpose

Being computer literate includes being able to

Avoid spam, adware and spyware, use the web effectively, diagnose and fix hardware and software problems

Computer Literate

Being familiar enough with computers that a user knows how to use them and understands their capabilities and limitations

Computer Literate

Being familiar enough with computers that you understand their capabilities and limitations and you know how to use them.

Which of the following is NOT a port that would be available on a sound card? A. Joystick controller B. Ethernet C. Microphone D. Line input

B. Ethernet

What cards are added to the computer to add certain functions, such as sound and video? A. Modem B. Expansion C. NIC D. Ethernet

B. Expansion

What card translates binary data into images on a monitor? A. NIC B. Video C. Sound D. CPU

B. Video

Bike-sharing programs like New York City's Citi Bike are an example of A. principled psychology. B. a subscription-style business model made possible by technology. C. crowdsourcing. D. crowdfunding.

B. a subscription-style business model made possible by technology.

Social media A. prevents two-way dialog between people. B. is incorporated as part of a political strategy by many politicians. C. cannot e immediate enough to react to quickly developing issues. D. is useful only for personal friendships.

B. is incorporated as part of a political strategy by any politicians.

E-commerce that involves businesses buying and selling goods and services to other businesses is called ________.

B2B

two digits

Binary numbers are based on a series of __________.

Which of the following is NOT a characteristic of a blog?

Blogs are private and require password access

What is the EU case on databases?

British Horseracing Board: basically, little protection for databases. ECJ says creating data (bringing into existence) not protected. No substantial investment. Whereas, gathering data, would be substantial investment. BHB loses! (CRAZY CASE!)

What is copyright?

Bundle of rights granted to authors, allowing them to control and prevent different uses by others

What is the difference b/t Civil and CL countries in regards to copyright?

Civil = natural rights based rationale CL = incentive based rationale

Where does Trademark derive it's authority?

Commerce Clause

PERIPHERAL DEVICE

Component that is connected to a computer

Analyzes computer systems to gather potential legal evidence

Computer forensics

Analyzing computer systems to gather legal evidence is known as the field of

Computer forensics

The MACH project shows that

Computers can help people with interpersonal skills development

Which of the following is an example of portable storage? A. Motherboard B. Internal hard disk C. Blu-ray disc D. CPU

C. Blu-ray disc

Where does the computer store instructions and data that are used most often by the CPU? A. Video RAM B. Hard drive C. Cache memory D. Read-only memory

C. Cache memory

A network interface card (NIC) gives you access to which type of port? A. HDMI B. USB C. Ethernet D. Firewire

C. Ethernet

Where are the instructions stored that the computer needs when it starts up? A. DVD drive B. Cache memory C. ROM D. RAM

C. ROM

Which of the following actions would NOT help to identify your personal ethics? A. describe yourself. B. identify the influences of your work environment C. conduct a genealogical study of your extended family. D. prepare a list of values that are most important to you.

C. conduct a genealogical study of your extended family.

Information technology is the study of A. stock prices and other financial data B. meteorological reports produced by supercomputer simulations. C. the processing and retrieval of information D. all of the above.

C. the processing and retrieval of information

Which of the following statements is FALSE? A. individuals who have no sense of right or wrong exhibit amoral behavior. B. ethical decisions are usually influenced by personal ethics. C. unethical behavior is always illegal. D. life experience affects an individual's personal ethics.

C. unethical behavior is always illegal.

eBay and Craigslist are examples of what kind of electronic commerce?

C2C

What are the policy difference on copyright b/t CL and Europe?

CL: instrumentalist, incentive for creativity EU: natural rights, fruits of your labor

the "brains of the computer

CPU

The Broad Range of Trademarks and Service Marks (((supplemental)))

Catchy Phrases—Certain brands have established phrases that are associated with them, such as Nike's "Just Do It!" As a marketing manager for a competing product, you will have to avoid such catchy phrases in your own marketing program. Note, though, that not all phrases can become part of a trademark or service mark. When a phrase is extremely common, the courts normally will not grant trademark or service mark protection to it. Abbreviations—The public sometimes abbreviates a well-known trademark. For example Budweiser beer is known as Bud and Coca-Cola as Coke. As a marketing manager, you should avoid using any name for a product or service that closely resembles a well-known abbreviation, such as Koke for a cola drink. Shapes—The shape of a brand name, a service mark, or a container can take on exclusivity if the shape clearly aids in product or service identification. For example, just about everyone throughout the world recognizes the shape of a Coca-Cola bottle. As a marketing manager, you would do well to avoid using a similar shape for a new carbonated drink. Ornamental Colors—Sometimes color combinations can become part of a service mark or trademark. For example, FedEx established its unique identity with the use of bright orange and purple. The courts have protected this color combination. The same holds for the black-and-copper color combination of Duracell batteries. Ornamental Designs—Symbols and designs associated with a particular mark are normally protected. Marketing managers should not attempt to copy them. Levi's places a small tag on the left side of the rear pocket of its jeans. Cross uses a cutoff black cone on the top of its pens. Sounds—Sounds can also be protected. For example, the familiar roar of the Metro-Goldwyn-Mayer (MGM) lion is protected.

What materials are covered in a Material Transer Agreement?

Cell lines, animal models such as knockout mice, cloning tools such as PCR, monocional antibodies, droug compounds, data, software and other materials useful in conducting research.

The ________ is used in combination with other keys to perform shortcuts and special tasks.

Control (Ctrl) key

What two WTO places do people go to settle disputes?

Council for TRIPS & Dispute Settlement Body

Counterfeit Goods

Counterfeit goods copy or otherwise imitate trademarked goods but are not genuine. - The importation of goods bearing counterfeit (fake) trademarks poses a growing problem for U.S. businesses, consumers, and law enforcement. - In addition to having negative financial effects on legitimate businesses, sales of certain counterfeit goods, such as pharmaceuticals and nutritional supplements, can present serious public health risks. - Although Congress has enacted statutes against counterfeit goods (discussed next), the United States cannot prosecute foreign counterfeiters because our national laws do not apply to them. - one effective tool that U.S. officials are using to combat online sales of counterfeit goods is to obtain a court order to close down the domain names of Web sites that sell such goods.

Computer technology is used in the arts by

Creating multimedia museum tours, creating web pages to advertise and sell art, integrating it into new works of performance art

The ________ lets information be created, distributed, and filtered by users themselves in real time.

DYTHR project

Which allows retailers to respond to consumer buying patterns?

Data Mining

Which of the following allows retailers to respond to consumer buying patterns

Data mining

INFORMATION

Data that has been organized in a meaningful fashion

A search engine that searches other search engines is called a SuperSearch engine.

False

Criminal investigators may find evidence on a computer, but the evidence cannot be used in court.

False

Data and information are interchangeable terms.

False

Each time you connect to the Internet, your computer is assigned the same IP address

False

Ergonomics is important only with desktop computers, not mobile devices.

False

Hacktivism is another word for cyberterrorism. True or False

False

Modern motivation theory says people work hardest when offered the highest pay. (T/F)

False

Which of the following is NOT a main component of the motherboard? A. CPU B. RAM C. Cache memory D. DVD

D. DVD

Intellectual property A. is the result of someone's creative work and design. B. can be protected legally by the patent system. C. can include works of music, film, or engineering design. D. all of the above.

D. all of the above

Being computer literate includes being able to A. avoid spam, adware, and spyware. B. use the web effectively. C. diagnose and fix hardware and software problems. D. all of the above.

D. all of the above.

Web 2.0 has led to a shift from just consuming content toward A. spending all our time on leisure activities. B. less sharing of the work we produce. C. new standards for HTML. D. producing content.

D. producing content.

The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.

DVI

What are moral rights?

Defend integrity and paternity of work

Secondary Meaning

Descriptive terms, geographic terms, and personal names are not inherently distinctive and do not receive protection under the law until they acquire a secondary meaning. - A secondary meaning arises when customers begin to associate a specific term or phrase, such as "London Fog," with specific trademarked items (coats with "London Fog" labels) made by a particular company. - Once a secondary meaning is attached to a term or name, a trademark is considered distinctive and is protected. Even a color can qualify for trademark protection, such as the color schemes used by state university sports teams, including Ohio State University and Louisiana State University.Footnote

What is the importance of an invention disclosure report?

Ensures compliance with the requirments of Bayh-Dole.

What kind of software is responsible for back office operations such as billing and inventory?

Enterprise resource planning

________ plug into slots on the motherboard and provide additional functionality for your computer.

Expansion cards

________ are a form of permanent storage that can be seen and accessed from outside the system unit and are typically used for CD and DVD drives.

External drive bays

Which is NOT an example of social networking?

E-mail

four digits

Each __________ of binary can be represented with a single digit of hexadecimal.

________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.

Embedded

________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.

Ergonomics

A(n) BLANK port is needed for connecting a computer to a wired network.

Ethernet

Give eight examples of Fair Use

Examples of fair use include commentary, criticism, news reporting, research, teaching, library archiving and scholarship.

Cognitive surplus means that we now find many people with:

Excess time and free tools for collaboration

QR codes let companies track your past purchases and customize offers for you.

False

Speakers connect to the VGA port.

False

Supercomputers can accurately forecast tornadoes within minutes.

False

The Next Einstein Initiative uses the power of supercomputing to enhance mathematical education

False

The Next Einstein Initiative uses the power of supercomputing to enhance mathematical education. True or False

False

The Next Einstein Initiative uses the power of supercomputing to enhance mathematical education. (T or F)

False

The clock speed of the CPU is the only measure of a processor's expected performance.

False

True and false The Next Einstein Initiative uses the power of super computing to enhance mathematical education

False

Virtual reality is the addition of infographics to your visual field

False

Virtual reality is the addition of infographics to your visual field. (T or F)

False

When you buy software, you then own it and can do anything you'd like with it, including giving it to a friends to install on their machine

False

When you need help with software, you should use the program's help features or manufacturer FAQs, not online help like podcasts or YouTube videos.

False

LED and LCD monitors are considered Legacy Technology

False, they are still being used today!

Strong Marks

Fanciful, arbitrary, or suggestive trademarks are generally considered to be the most distinctive (strongest) trademarks. - Because they are normally taken from outside the context of the particular product, strong marks provide the best means of distinguishing one product from another.

The name of the free Internet browser from Mozilla is ________.

Firefox

permanent DVD drives

Fixed media bays can be used for __________.

What type of storage device can you use to transfer digital data between your computer and devices such as digital cameras?

Flash Memory Card

Next Einstein Initiative NEI

Focuses technological resources on talented young Africans

When does copyright protection begin?

From the time the authored work is created in a fixed tangible form and the work of authorship immediately becomes the property of the author who created the work.

________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.

Function keys

TRUE

Game controllers such as joysticks, game pads, and steering wheels are examples of input devices.

Computer forensics uses computer systems and technology to

Gather potential legal evidence

Crowdfunding helps start-up businesses by

Gathering financial contributions from supporters

What is the nationality of origin in Berne?

Generally where published.

What is a Utility Patent?

Granted to anyone who invents or discovers any new and useful process, machine, article of manufacture or compositions of matters, or any new useful improvement thereon.

You can connect a high-definition television to your computer using a(n) BLANK port.

HDMI

uncompressed digital data

HDMI (High-Definition Multimedia Interface) is a compact audio/video interface for transmitting __________.

What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser?

HTTP

________ is a power mode that allows the computer to save an image of the desktop to the hard drive and enter a state of reduced power consumption to save energy.

Hibernate

ergonomics.

How you arrange your computer and other equipment to minimize your risk of injury or discomfort is________.

Why did small countries sign on to TRIPS?

IP was tied to other trade issues

Patent Infringement

If a firm makes, uses, or sells another's patented design, product, or process without the patent owner's permission, it commits the tort of patent infringement. Patent infringement may occur even though the patent owner has not put the patented product in commerce. Patent infringement may also occur even though not all features or parts of an invention are copied. (To infringe the patent on a process, however, all steps or their equivalent must be copied.) Foreign firms can apply for and obtain U.S. patent protection on items that they sell within the United States, just as U.S. firms can obtain protection in foreign nations where they sell goods. a general rule, no patent infringement occurs under U.S. law when a patented product is made and sold in another country.

Remedies for Patent Infringement

If a patent is infringed, the patent holder may sue for relief in federal court. The patent holder can seek an injunction against the infringer and can also request damages for royalties and lost profits. In some cases, the court may grant the winning party reimbursement for attorneys' fees and costs. If the court determines that the infringement was willful, the court can triple the amount of damages awarded (treble damages). In 2006, however, the United States Supreme Court ruled that patent holders are not automatically entitled to a permanent injunction against future infringing activities. According to the Supreme Court, a patent holder must prove that it has suffered irreparable injury and that the public interest would not be disserved by a permanent injunction. This decision gives courts discretion to decide what is equitable in the circumstances and allows them to consider the public interest rather than just the interests of the parties. Actual damages are based on the harm caused to the copyright holder by the infringement, while statutory damages, not to exceed $150,000, are provided for under the Copyright Act.

How long does copyright protection last for an authored work?

If the authored work was originally created on or after January 1, 1978 the term os for the author's life plus 70 years after their death.

expansion cards

If you don't have all the built-in connectors you would like in a laptop, you can add __________.

FireWire

If you're editing digital videos, which kind of port works well for downloading video?

________ printers have tiny hammerlike keys that strike the paper through an inked ribbon.

Impact

The Anti-Counterfeiting Trade Agreement (ACTA) (2011)

In 2011, Australia, Canada, Japan, Korea, Morocco, New Zealand, Singapore, and the United States signed the Anti-Counterfeiting Trade Agreement (ACTA), an international treaty to combat global counterfeiting and piracy. The members of the European Union, Mexico, Switzerland, and other nations that support ACTA are still developing domestic procedures to comply with its provisions. Once a nation has adopted appropriate procedures, it can ratify the treaty. Goals: - to increase international cooperation, facilitate the best law enforcement practices, and provide a legal framework to combat counterfeiting. - ACTA applies not only to counterfeit physical goods, such as medications, but also to pirated copyrighted works being distributed via the Internet. The idea is to create a new standard of enforcement for intellectual property rights that goes beyond the TRIPS agreement and encourages international cooperation and information sharing among signatory countries. Border Searches" - Under ACTA, member nations are required to establish border measures that allow officials, on their own initiative, to search commercial shipments of imports and exports for counterfeit goods. The treaty neither requires nor prohibits random border searches of electronic devices, such as laptops, tablet devices, and smartphones, for infringing content. If border authorities reasonably believe that any goods in transit are counterfeit, the treaty allows them to keep the suspect goods unless the owner proves that the items are authentic and noninfringing. - The treaty allows member nations, in accordance with their own laws, to order online service providers to furnish information about (including the identity of) suspected trademark and copyright infringers.

What are Four Types of Intellectual Property?

Patent, Trademark, Copyright, Trade Secret

tendonitis

Incorrect placement of your keyboard can cause __________.

Collaborative consumption is when people get together to

Increase the use of a single product by sharing access to it

What is the requirement for originality in the US?

Independent Creation + Modicum of creativity (Feist)

A field of study focused on managing and processing information and the automatic retrieval of information is

Information Technology

IT is the abbreviation for

Information technology

________ is a field of study focused on information handling and retrieval of information automatically.

Information technology

Which is NOT an advantage of using software suite?

The programs integrate easily with programs from other software suites.

Section 102 Exclusions

It is not possible to copyright an idea. Section 102 of the Copyright Act specifically excludes copyright protection for any "idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied." What is copyrightable is the particular way in which an idea is expressed. Whenever an idea and an expression are inseparable, the expression cannot be copyrighted. Generally, anything that is not an original expression will not qualify for copyright protection. Facts widely known to the public are not copyrightable. Page numbers are not copyrightable because they follow a sequence known to everyone. Mathematical calculations are not copyrightable. for the design of a useful article to be copyrightable, the sculptural features of the article (the way it looks) must be separate from the article's utilitarian (functional) purpose.

Which is NOT true about the internet

It was developed as an additional means of commerce

Which case? courts can look to foreign law when dealing with ownership and domestic law when looking at infringement?

Itar-Tass Russian News Agency

Collaborative Consumption

Joining together as a group to use a specific product more efficiently

Examples of crowdfunding and crowdsourcing include

Kickstarter and MobileVoice

Examples of crowdfunding and crowd sourcing includes

Kickstarter, MobileVoice

What case says copyright infringement is transitory and allows US court jurisdiction?

London Films: UK corp. infringed by corp. in Chile. Us not Rome signatory, still enforces.

A small program that groups a series of commands so they will run as a single command is called a:

Macro

When and where do you register a copyright?

The registration is made to the Library of Congress in the Copyright Office. Registrations can be made at any time within the life of the copyright with the use of U.S. Government forms.

Software

The set of computer programs or instructions that tells the computer what to do and that enables it to preform different tasks

BRIGHTNESS

Measure of light showing when the monitor is displaying pure white

SCREEN RESOLUTION

Measured in the number of pixels on the screen.

Researchers believe that microchips may one day restore sight to the blind.

True

Image, video, and audio editing software belong in the category of what kind of software?

Multimedia Software

System Software include the operating system and utility programs.

True

Teachers can show students simulations online and use instructional software programs on the web

Museums and Technology now have virtual tours on websites also used to enhance visitors experiences at museums suchas New York's Museum of Art which has podcasts and multimedia tours to supplement experience while there.

Does TRIPS require moral rights?

NO.

Does EU database violate TRIPS?

No. B/c TRIPS doesn't address databases.

What enables your computer to connect with other computers?

Network Interface Card

Collateral Estoppel: Can a company successfully assert in the US based on an ECJ finding?

No

People form into groups based on what?

Not age or income, but common interests.

________ displays use organic compounds that produce light when exposed to an electric current.

OLED

The Internet is referred to as a client/server network.

True

Is the anti-bootlegging statute constitutional?

Only applies to music. Yes, under commerce clause.

Which is NOT a built-in-input device for a notebook?

Optical Mouse

What treaty deals with patent, trademark, and industrial property?

Paris (1883)

Penalties for Counterfeiting

Persons found guilty of violating the SCMGA may be fined up to $2 million or imprisoned for up to ten years (or more if they are repeat offenders). - If a court finds that the statute was violated, it must order the defendant to forfeit the counterfeit products (which are then destroyed), as well as any property used in the commission of the crime. - The defendant must also pay restitution to the trademark holder or victim in an amount equal to the victim's actual loss.

What case illustrates the national treatment principle and why?

Phil Collins: He sued in Germany, where someone was selling an illegal copy of a US concert. Only Germans had redress. Phil Collins appealed to the ECJ, who found Germany violated national treatment.

Which of the following is true about plug-ins?

Plug-ins are necessary for viewing most web graphics

What type of software enables you to create dynamic slide shows?

Presentation

New technologies pushing the boundaries of printing include ________.

all of these

E-commerce (or electronic commerce)

Process of conducting business online, such as through advertising and selling products

Web 2.0 has led to a shift from just consuming content toward

Producing content

What does PIPA stand for?

Protect Internet Protocol Act

Which is NOT a technology that has been used to deliver assistance during times of crisis?

QR codes

DVI port

Question 4. This port enables you to connect your computer to a flat-panel monitor.

The contents of BLANK memory are erased when the computer is turned off.

RAM

________ is the place in a computer where the programs and data the computer is currently using are stored.

RAM

stores information as long as the computer is on

RAM

________ tags, when placed on a car, can be used to record and track in a database all of the vehicle's movements.

RFID

Which holds the instructions the computer needs to start up?

ROM

________ is a form of permanent memory that holds all the instructions the computer needs to start up.

ROM

stores computer start up instructions

ROM

Podcasts use which of the following technologies?

RSS

wrist rest

To reduce wrist strain, use a __________.

RFID Radio Frequency Identification Tags

Ranchers use to manage and minimize disease outbreaks among cattle; RFID tags emit a wireless signal at all times across a network, which can communicate with other devices.

RSS stands for ________.

Really Simple Syndication

The decimal number is 1,000.

Referring to the demonstration in the Sound Byte, what happens when you dump the 102 bucket ten times?

Trademark Infringement (used without authorization)

Registration of a trademark with the U.S. Patent and Trademark Office gives notice on a nationwide basis that the trademark belongs exclusively to the registrant. - The registrant is also allowed to use the symbol ® to indicate that the mark has been registered. - Whenever someone else uses that trademark in its entirety or copies it to a substantial degree, intentionally or unintentionally, the trademark has been infringed (used without authorization). - When a trademark has been infringed, the owner has a cause of action against the infringer. - To succeed in a lawsuit for trademark infringement, the owner must show that the defendant's use of the mark created a likelihood of confusion about the origin of the defendant's goods or services. - The owner need not prove that the infringer acted intentionally or that the trademark was registered (although registration does provide proof of the date of inception of the trademark's use). - The remedy most commonly granted for trademark infringement is an injunction to prevent further infringement. Under the Lanham Act, a trademark owner who successfully proves infringement can recover actual damages, plus the profits that the infringer wrongfully received from the unauthorized use of the mark. A court can also order the destruction of any goods bearing the unauthorized trademark. In some situations, the trademark owner may also be able to recover attorneys' fees.

What is 37 CFR Part 401?

Regulation regarding "Rights to Inventions Made by Nonprofit Organizations and Small Business Firms"

The TRIPS Agreement (1994) (>100)

Representatives from more than 100 nations signed the TRIPS agreement in 1994. The agreement established, for the first time, standards for the international protection of intellectual property rights, including patents, trademarks, and copyrights for movies, computer programs, books, and music. The TRIPS agreement provides that each member country of the World Trade Organization must include in its domestic laws broad intellectual property rights and effective remedies (including civil and criminal penalties) for violations of those rights. Generally, the TRIPS agreement forbids member nations from discriminating against foreign owners of intellectual property rights (in the administration, regulation, or adjudication of such rights). In other words, a member nation cannot give its own nationals (citizens) favorable treatment without offering the same treatment to nationals of all other member countries.

Collaborative Consumption

Sharing products rather than owning them individually

When using the Internet for research, you:

Should evaluate sites for bias and relevance

The minimum set of recommended standards for a program is known as the

System Requirements

What treaty sets a minimum standard for all forms of Intellectual Property?

TRIPS

What treaty requires national treatment for IP issues?

TRIPS; art. 3

What treaty requires MFN treatment for Intellectual Property issues?

TRIPS; art. 4; in general, you can't treat one country better than another (even if they are non-WTO)

A ________ was the first devices with touch screen capabilities.

Tablet PC

Technology that has been used to deliver assistance during times of a crisis.

Social media, Ushahidi, e-mail

________ is the gathering together of groups of people using online tools to connect and exchange ideas.

Social networking

INKJET PRINTER

Sprays tiny drops of ink on the paper

Statutory Protection of Trademarks

Statutory protection of trademarks and related property is provided at the federal level by the Lanham Act of 1946.

What case illustrates why a company needs to seeks IP protection outside the US?

Subafilms:The law of the US does not apply abroad, to extraterritorial infringement.

Which is NOT part of a search engine?

Subject Directory

________ software is the set of programs that enables the computer's hardware devices and application software to work together.

System

QR (Quick Response) Codes

Technology that lets any piece of print in the real world host a live link to online information and video content

Name the key principles to discuss about international patent or copyright infringement

Territoriality; National Treatment; MFN; Choice of Law; Choice of Forum; Recognition of Foreign Judgments; Res Judicata/Collateral Estoppel

Being computer literate is an advantage in almost every type of career. (T/F)

True

What is the Bayh-Dole Act?

The Bayh-Dole statute (37 U.S.C. Part 401) marked a turning point in the ability to move technology from university research into commercial use and is credited by some as one of the factors that lead to a resurgence of the United States a a leader in technology.

U.S. Constitution, Article 1, Section 8, Clause 8 states?

The Congress shall have the power...to promote the progress of science and useful arts by securing for limited times to authors and inventors the exclusive rights to their respected writings and discovers."

When purchasing items over the Internet, be sure to check ________.

all of these

The ________ is a strategic plan to focus on the young, talented, mathematical minds of Africa.

The Next Einstein Initiative

Many modern museums offer WiFi networks and multimedia downloads to their patrons to enrich their experience

True

motherboard

The _______ is the main circuit board that contains the central electronic components of the computer.

Computer Forensics

The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high-tech crime.

Who owns copyrighted work?

The author or those to whom the author has assigned their ownership rights

Cognitive Surplus

The combination of leisure time and the tools needed to be creative

RAM

The contents of __________ are erased when the computer is turned off.

1

The digit to the far right in any base system always has a place value of __________.

Digital Divide

The discrepancy between those who have access to the opportunities and knowledge that computers and the internet offer and those who do not

copyright

The exclusive right of an author or originator of a literary or artistic production to publish, print, sell, or otherwise use that production for a statutory period of time. an intangible property right granted by federal statute to the author or originator of certain literary or artistic productions. The Copyright Act of 1976 governs copyrights. Works created after January 1, 1978, are automatically given statutory copyright protection for the life of the author plus 70 years. For copyrights owned by publishing companies, the copyright expires 95 years from the date of publication or 120 years from the date of creation, whichever is first. For works by more than one author, the copyright expires 70 years after the death of the last surviving author. Copyrights can be registered with the U.S. Copyright Office (www.copyright.gov) in Washington, D.C. A copyright owner no longer needs to place a © or Copr. or Copyright on the work, however, to have the work protected against infringement. Chances are that if somebody created it, somebody owns it. copyright owners are protected against the following: 1. Reproduction of the work. 2. Development of derivative works. 3. Distribution of the work. 4. Public display of the work.

Digital Divide

The gap between the levels of Internet access and the availability of technical tools in different regions of the world.

120 GB to 2 TB

The hard drive currently stores ______ amount of data.

trade dress

The image and overall appearance ("look and feel") of a product that is protected by trademark law. - a broad concept that can include all or part of the total image or overall impression created by a product or its packaging. - The distinctive decor, menu, and style of service of a particular restaurant may be regarded as the restaurant's trade dress. Similarly, trade dress can include the layout and appearance of a mail-order catalog, the use of a lighthouse as part of a golf hole, the fish shape of a cracker, or the G-shaped design of a Gucci watch. - trade dress is subject to the same protection as trademarks.

Who owns a patent?

The inventor - unless they have assigned their ownership rights or are required to assign their ownership rights to their employer or another third party.

parallel to the floor while you are typing.

The keyboard should be positioned so your forearms are ________.

binary

The language computers use to process data into information, consisting of only the values 0 and 1.

Which of the following is true about open source software?

The program can be changed and freely distributed.

South Korea

The most wired country in the world, where 80% of households have high-speed internet connections.

The crisis of a growing digital divide is being addressed by

The next Einstein project

CPU

The part of the computer used for arithmetic operations is the __________.

Crowdsourcing

The phenomenon of consumers checking in with the voice of the crowd before making purchases.

the printer

The power supply provides power for all of the following EXCEPT __________.

data mining

The process by which great amounts of data are analyzed and investigated. The objective is to spot significant patterns or trends within the data that would otherwise not be obvious.

purpose

The understanding that you are working for something larger than yourself.

Which is TRUE about mainframe computers?

They support hundreds of users simultaneously.

The World Wide Web was invented by ________.

Tim Berners-Lee at CERN

Ethernet

To connect your computer to a network, the __________ port would be used.

Mastering software animation tools, such as Autodesk 3ds Max, will enable you to create compelling new worlds and new characters.

True

Trade Secrets in Cyberspace

Today's computer technology undercuts a business firm's ability to protect its confidential information, including trade secrets. For instance, a dishonest employee could e-mail trade secrets in a company's computer to a competitor or a future employer. If e-mail is not an option, the employee might walk out with the information on a flash pen drive. A former employee's continued use of a Twitter account after leaving the company may be the grounds for a suit alleging misappropriation of trade secrets.

Trademark Registration

Trademarks may be registered with the state or with the federal government. - To register for protection under federal trademark law, a person must file an application with the U.S. Patent and Trademark Office in Washington, D.C. A mark can be registered: 1. if it is currently in commerce or 2. if the applicant intends to put the mark into commerce within six months. - In special circumstances, the six-month period can be extended by thirty months, giving the applicant a total of three years from the date of notice of trademark approval to make use of the mark and to file the required use statement. Registration is postponed until the mark is actually used. - During this waiting period, the applicant's trademark is protected against any third party who has neither used the mark previously nor filed an application for it. - Registration is renewable between the fifth and sixth years after the initial registration and every ten years thereafter (every twenty years for trademarks registered before 1990).

Does Berne cover sound recordings and performance rights?

Trick Question! Depends on the country's definition of copyright!

A Software suite is a group of programs bundled as a package.

True

A green shaded address bar on a Web site indicates that the Web site is secure.

True

A macro is a small program that groups a series of commands so that they run as a single command.

True

A universal chat client allows you to chat with users who are using a different IM service than you are.

True

________ is a social networking service that enables you to exchange short text messages with your friends or "followers."

Twitter

What's the difference b/t how the US and Europe sees authorship?

US = sound recordings & performers are authors Europe = no to sound recordings & performers

What hypo dealt with enforcement of foreign judgments?

US pays photographer to shoot dresses in France. US company sued under French copyright law. US won't enforce b/c against public policy

Give examples of how copyright is functionally different in US and EU?

US: allows works for hire EU: allows moral rights (attribution & integrity)

Flash drives plug into a(n) ________.

USB port

What's the rule of the shorter term?

Under Berne, protection is the life of the author + 50 years unless the second country decides to make it longer.

State and Federal Law on Trade Secrets

Under Section 757 of the Restatement of Torts, those who disclose or use another's trade secret, without authorization, are liable to that other party if: 1. They discovered the secret by improper means, or 2. Their disclosure or use constitutes a breach of a duty owed to the other party.

What type of microphone is best for recording a single voice?

Unidirectional

The text version of a Web site's Internet address is called the ________.

Uniform Resource Locator (URL)

S-video

Which port is used to connect a laptop to a television?

________ ports are now the most common ports for connecting input and output devices to the computer.

Universal serial bus (USB)

Spam

Unwanted junk e-mail.

Spam

Unwanted or junk email

a TV

Upgraded sound cards enable you to connect all of the following devices to your computer EXCEPT __________.

High Low Tech

Use inexpensive low tech parts to imitate the utility of expensive high tech tools

Artists interface with technology often, but cannot yet

Use software to suggest plot endings

U.S. patent law specifies that the subject matter must be?

Useful

LASER PRINTER

Uses heat to fuse the toner to the page

A crisis mapping tool such as ________ can collect information to make instantly and publicly available for use in emergencies.

Ushahidi

Which of the following is true about crisis-mapping software?

Ushahidi was created in a few days and distributed globally for free.

Which technologies have been used during times of crisis?

Ushahidi, SwiftRiver, Email, NOT QR codes

a NIC

Using __________ is one way to connect your computer with other computers.

crowdfunding

Using the Internet to get small donations from many people to start a business is called

Laser printers

Which printers are usually used in offices and classrooms because they print faster and produce high-quality printouts?

All of the above statements are true.

Which statement about video cards in NOT true?

All ports look the same.

Which statement is NOT true of a port?

Bluetooth range is about 30 feet.

Which statement is TRUE regarding Bluetooth?

Everything a computer does is broken down into a series of 0s and 1s.

Which statement is true about binary language?

The keyboard and the mouse

Which two objects should be at about the same height?

RAM

Which type of memory is considered volatile?

What organization administers TRIPS?

WTO

What treaties are relevant to copyright?

WTO members (TRIPS & Berne) Rome Convention (US not part of)

www.uspto.gov

Web site of the U.S. Patent and Trademark Office - provides searchable databases covering U.S. patents granted since 1976.

What is another name for Software as a Service (SaaS)?

Web-based application

Software that is available on-demand via the Internet is called:

Web-based software

Quick Response

What does QR stand for?

ROM

What holds all the instructions the computer needs to start up when it is powered on?

Sleep mode saves everything to memory, whereas Hibernate stores your data on your hard drive and your computer is powered off

What is the difference between Sleep mode and Hibernate in Windows 7?

Stores instructions the computer needs to start up

What is the purpose of ROM?

RJ-45

What is the technical name for the Ethernet port?

256

What is the value of the third column from the right in base 16?

Blink your eyes frequently

What steps should you take to prevent eye strain while staring at the monitor?

All data

What types of data are stored in computers as binary numbers?

Modem port

Which type of port looks like a normal phone jack?

clipboard

When a tablet PC has the monitor folded over the keyboard, it is said to be in __________ mode.

FALSE

When purchasing a printer, the cost of the printer is the only cost factor you need to consider.

0 to 255

When referring to RGB, each of the three colors can have values ranging from __________.

The color is black.

When referring to the colors displayed on a computer monitor, what results when the Red, Green, and Blue values are all set to 0?

When is copyright protection secured?

When the work is created in a tangible form. If a work is prepared oveer a period of time, the part of the work that is fixed on a particular date constitutes the created work as of that date.

FireWire card

Which of the following expansion cards does NOT provide some form of Internet connectivity for a notebook computer?

The keyboard should be placed on a shelf above the desktop.

Which of the following is NOT a healthy computing habit?

Placing the monitor off-center

Which of the following is NOT a preventative measure for computer vision syndrome?

Spots floating in front of your eyes

Which of the following is NOT a symptom of eye strain?

Pencil

Which of the following is NOT a tablet PC component?

Parallel

Which of the following is NOT a typical laptop port?

Solid-state drive

Which of the following is NOT another name for a flash drive?

Usually do not come with the computer

Which of the following is NOT true about expansion cards?

Most new laptops include a fixed floppy drive.

Which of the following is NOT true?

Terabyte

Which of the following terms represents one trillion bytes of data?

aspect ratio

Width-to-height proportion of a monitor is its ________.

Who uses social networking the most?

Women, so marketers will be increasingly driven by female perspective and by a more complex model of what groups are attracted to. No more cliches

What is "work made for hire"?

Work prepared by an employee within the scope of his or her employment.

What Is Protected Expression?

Works that are copyrightable include books, records, films, artworks, architectural plans, menus, music videos, product packaging, and computer software. To be protected, a work must be "fixed in a durable medium" from which it can be perceived, reproduced, or communicated. Protection is automatic. Registration is not required. Section 102 of the Copyright Act explicitly states that it protects original works that fall into one of the following categories: 1. Literary works (including newspaper and magazine articles, computer and training manuals, catalogues, brochures, and print advertisements). 2. Musical works and accompanying words (including advertising jingles). 3. Dramatic works and accompanying music. 4. Pantomimes and choreographic works (including ballets and other forms of dance). 5. Pictorial, graphic, and sculptural works (including cartoons, maps, posters, statues, and even stuffed animals). 6. Motion pictures and other audiovisual works (including multimedia works). 7. Sound recordings. 8. Architectural works.

Augmented Reality

a combination of our normal sense of the objects around us with an overlay of info displayed

Law - Contract

a company can protect what they consider to be a trade secret.

Once a point-of-attachment exists in a Berne country, does US automatically recognize it?

YES!

Can corporations be authors under Berne?

Yes

Are computer programs protected under copyright?

Yes, TRIPS says they are protectable under Berne.

Is there a way an author can get Berne protection without their country signing it?

Yes."Backdoor to Berne." Protection if you habitually reside or publish in a Berne country within 30 days.

DVDs

_______ can store approximately 14 times more data than a CD.

The Khan Academy is

a free technology tool used for education.

What does Web 2.0 describe?

a trend of new Web applications that combine the functionality of multiple applications

Bluetooth

a type of wireless communication

QR codes can be linked to

a video, a Facebook page, a website.

Restarting a computer when it is already powered on is called ________.

a warm boot

Faculty at universities often use course management software such as ________ to make information available to students. a. Blackboard b. Blueboard c. Noodle d. Whiteboard

a. Blackboard

The process of searching huge amounts of data with the hope of finding a pattern is called ________. a. data mining b. data searching c. data warehousing d. data retrieval

a. data mining

Unwanted or junk e-mail is called ________. a. spam b. spyware c. adware d. software

a. spam

people who dont read emotion easily in others hope for new progress in the field of

affective computing

Most Favored Nations

all WTO countries get same treatment as other countries

Computer technology is used in the arts by

all of the above -creating web pages to advertise and sell art -creating multimedia museum tours -integrating it into new works of performance art

Being computer literate includes being able to

all of the above -diagnose/fix hardware/software issues -use the web effectively -avoid spam, adware, and spyware

Data mining is

all of the above -important now because it is so easy to gather enormous data sets - the study of data using algorithms to detect patterns -the translation of Big Data sets into meaningful information

Social media has been used to

all of the above -replace TV and radio ads in political elections -increase voter turnout -increase communication between elected officials and their constituents

Boolean operators include such words as ________.

all of these

The Berne Convention (1989) (163)

an international copyright agreement, if a U.S. citizen writes a book, every country that has signed the convention must recognize her or his copyright in the book. Also, if a citizen of a country that has not signed the convention first publishes a book in one of the 163 countries that have signed, all other countries that have signed the convention must recognize that author's copyright. Copyright notice is not needed to gain protection under the Berne Convention for works published after March 1, 1989.

How to be computer savvy

avoid hackers protect privacy understand real risks use web wisely avoid online annoyances (spam)be able to maintain, upgrade, and troubleshoot computer

Being computer literate includes being able to

avoid spam, adware, and spyware. use the web effectively. diagnose and fix hardware and software problems.

The Madrid Protocol (2003) (86)

an international treaty that has been signed by 86 countries. Under its provisions, a U.S. company wishing to register its trademark abroad can submit a single application and designate other member countries in which the company would like to register its mark. The treaty was designed to reduce the costs of international trademark protection by more than 60 percent. Although the Madrid Protocol may simplify and reduce the cost of trademark registration in foreign countries, it remains to be seen whether it will provide significant benefits to trademark owners. Even with an easier registration process, there are still questions as to whether all member countries will enforce the law and protect the mark.

Computer forensics

analyzes computer systems to gather potential legal evidence

Computer forensics

analyzes computer systems to gather potential legal evidence.

Computer Forensics

analyzes computer systems with specific techniques to gather potential legal evidence

computer forensics*

analyzes computer systems with specific techniques to gather potential legal evidence. When have a suspect can search computer history and searches etc

Which of the following is NOT one of the four major data processing functions of a computer?

analyzing the data or information

What can be Patented?

any invention of a "new and useful process, machine, manufacture or composition of matter or any new and useful improvement thereof, 34 U.S.C. 101

QR Codes (Quick Response Codes)*

any piece of print in the real world can host a live link to online info and video content. They can be on fliers, advertisements, signs etc. Use app on smartphone to scan the code

Who can be inventors?

anyone who contributes to the "conception" or the "reduction to practice" of an invention. A student, technician, employee in any capacity, or a junior or senior faculty.

Compilations of Facts

are copyrightable Under Section 103 of the Copyright Act, a compilation is a work formed by the collection and assembling of preexisting materials or of data that are selected, coordinated, or arranged in such a way that the resulting work as a whole constitutes an original work of authorship. The key requirement for the copyrightability of a compilation is originality. The White Pages of a telephone directory do not qualify for copyright protection because they simply list alphabetically names and telephone numbers. The Yellow Pages of a directory can be copyrightable, provided that the information is selected, coordinated, or arranged in an original way.

Webcasts differ from podcasts in that webcasts ________.

are not updated automatically

Generic Terms

are terms that refer to an entire class of products, such as bicycle and computer. - receive no protection, even if they acquire secondary meanings. - For instance, aspirin and thermos were originally trademarked products, but today the words are used generically. - Other trademarks that have acquired generic use include escalator, trampoline, raisin bran, dry ice, lanolin, linoleum, nylon, and cornflakes.

The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________.

autism

Which of the following is an example of data mining? a. An Excel spreadsheet listing all employees and their annual salaries in a random order. b. Amazon providing you with a list of books you might enjoy. c. Raw data from questionnaires given at the mall. d. A printout of all sales taken from the register at the end of the day.

b. Amazon providing you with a list of books you might enjoy

The crisis-mapping tool ________ can collect information to make instantly and publicly available for use in emergencies. a. Marahabaa b. Ushahidi c. data mining d. The Witness Project

b. Ushahidi

Analyzing computer systems to gather potential legal evidence is ________.

b. computer forensics

Analyzing computer systems to gather potential legal evidence is ________. a. computer detectives b. computer forensics c. forensics detectives d. computer enforcement

b. computer forensics

People who are ________ make the Internet a powerful research tool and know how to find the information that they want effectively. a. computer productive b. computer literate c. technologically informed d. computer efficient

b. computer literate

Using the Internet to get small donations from many people to start a business is called ________. a. kickstarting b. crowdfunding c. crowdsourcing d. collaborating

b. crowdfunding

When being used as a portable device, the components inside a laptop computer derive their power from the BLANK inside the computer.

battery

Which of the following is NOT necessarily part of being computer literate?

being able to build a computer

Computer Literate*

being familiar enough with computers that you understand their capabilities and limitations and know how to use them efficiently

One potential application of ________ is to provide sight to the blind.

biomedical chip implants

Technology and Medicine

biomedical chip implants could give sight to the blind VeriMed is a personal ID chip size of rice and implanted under skin; contains name address and medical conditions of person whom the chip was implanted in Mu-chip as well Science and Technology Tornado forecasting more accurate can study ruins without being onsite

The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind.

biomedical chip research

Which is NOT a technology that has been used to deliver assistance during times of crisis?

blend.io

A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.

breadcrumb trail

Suggestive Trademarks

bring to mind something about a product without describing the product directly. - example (1): "Dairy Queen" suggests an association between its products and milk, but it does not directly describe ice cream. - example (2): "Blu-ray" is a suggestive mark that is associated with the high-quality, high-definition video contained on a particular optical data storage disc. Although blue-violet lasers are used to read blu-ray discs, the term blu-ray does not directly describe the disc.

Podcasts enable you to ________.

broadcast over the Internet using compressed audio and video files such as MP3s and MP4s

The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________. a. paralysis b. diabetes c. autism d. drain damage

c. autism

The goal of ________ is to provide technological solutions to physical problems, such as providing sight to the blind. a. 3D animations b. computer forensics c. biomedical chip research d. RFID technology

c. biomedical chip research

Being ________ means being familiar enough with computers that you understand their capabilities and limitations. a. computer savvy b. technology literate c. computer literate d. computer competent

c. computer literate

The ESP system targeted at helping with autism stands for ________. a. extra sensory perception b. emotional-stabilizing program c. emotional-social prosthesis d. emotional-social program

c. emotional-social prosthesis

The Witness Project uses the power of video and a grassroots movement to advocate for ________. a. computer literacy b. social networking c. human rights d. responsible citizenship

c. human rights

Autonomy is defined as ________. a. working for something larger. b. feeling confident and excited about learning new skills. c. working without continual direction and control. d. repressing motivated behavior.

c. working without continual direction and control.

stores instructions and data used most often

cache

The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems.

certain Microsoft operating systems and Office software

Crowdsourcing

checking in with the voice of the crowd

Crowdsourcing*

checking in with the voice of the crowd. Example) MobileVoice to see people's verdict on quality of an item. Some companies are using them to improve their business and be proactive.

Joining together as a group to use a specific product more efficiently is called ________.

collaborative consumption

Crisis Mapping Tool*

collects info from e-mails, texts, blogs, tweets, and maps them making the info instantly publicly available. (example) Ushahidi

Augmented Reality

combination of normal sense of objects around us with an overlay of info displayed

What redress to companies have that reasonably relied?

compulsory license, or have one year to sellinfringing work

Analyzing computer systems to gather legal evidence is known as the field of

computer forensics

Analyzing computer systems to gather legal evidence is known as the field of

computer forensics.

People who are ________ make the Internet a powerful tool and know how to find the information that they want effectively.

computer literate

As engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human

computer systems

The MACH project shows that

computers can help people with interpersonal skills development

The MACH project shows that

computers can help people with interpersonal skills development.

Affective Computing

computing that relates to emotion or deliberately tries to influence emotion

Affective Computing

computing that relates to emotion or deliberately tries to influence emotion. the wide gap in computers' ability to do calculations versus their emotional abilities is the target of research

Social Networking

gathering together of groups of people using online tools to connect and exchange ideas

Which of the following software can best be used to help create digital art? a. Microsoft Excel b. Microsoft Word c. Adobe Acrobat d. Adobe Illustrator

d. Adobe Illustrator

________ is a field of study focused on information handling and retrieval of information automatically. a. Computer forensics b. Database mining c. RFID d. Information technology

d. Information technology

________ is a wearable device that hangs around your neck and consists of a camera, a projector, and a mirror that can communicate with the Internet over wireless Bluetooth technology. a. FastSCAN b. Data mining c. Emotional-social prosthesis (ESP) d. SixthSense

d. SixthSense

Joining together as a group to use a specific product more efficiently is called ________. a. affective computing b. social networking c. creative surplus d. collaborative consumption

d. collaborative consumption

The process of searching huge amounts of data with the hope of finding a pattern is called ________.

data mining

Which of the following allows retailers to respond to consumer buying patterns?

data mining

what allows retailers to respond to consumer buying patterns?

data mining

Being computer literate includes being able to

diagnose and fix hardware and software problems. avoid spam, adware, and spyware. use the web effectively.

Digital Divide*

difference in ease of access to technology. prevents us from using all of the minds on the planet to solve the planet's problems.

Being computer savvy means you ________.

do all of these

In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of ________.

eight bits

Offshored

employement sent to other countries

Technology in Law Enforcement

facial recognition from skull search databases computer based trainingcomputer forensics

A virus is electronic junk mail.

false

Affective computing is a field of study focused on managing and processing information and the automatic retrieval of information.

false

Application software helps run the computer and coordinates instructions.

false

Autonomy is the feeling of confidence and excitement for seeing your own skills progress.

false

Autonomy is the feeling of confidence and excitement from seeing your own skills progress. true or false

false

Brightness determines how lighter colors appear on the display.

false

Computer literacy means that you are an expert on computer repair

false

Crowdfunding is asking for large donations from a few people.

false

Data and information are terms that can be used interchangeably.

false

Data mining is the set of techniques used in information handling and retrieval.

false

Digital cameras, camcorders, and webcams are common devices for capturing pictures and video and are all considered output devices.

false

E-mails are completely private.

false

Educators do not need to be computer literate.

false

Educators do not need to be computer literate. false or true

false

Educators do not need to be computer literate. true or false

false

Hardware refers to the programs that give commands to the computer.

false

Hospitals use nonimplant versions of identity chips on the wristbands of all patients.

false

If you are a design student, there is no reason for you to know how to use a computer.

false

If you are a design student, there is no reason for you to know how to use a computer. true or false

false

In a database, a table can be defined as a data category.

false

Instant messaging is available only from AOL.

false

Mainframes are used in situations where complex models requiring mathematical calculations are needed

false

Mastery is the simple understanding that you are working for something larger than yourself.

false

Mastery is the simple understanding that you are working for something larger than yourself. true or false

false

Media management programs are entertainment applications that turn artificial environments into a realistic experience.

false

Mastery

feeling confident and excited about learning new skills

Mastery*

feeling of confidence and excitement from seeing your own skills progress

Information technology (IT)

field of study focused on handling and automatic retrieval of information.

Information Technology*

field of study focused on managing and processing info and the automatic retrieval of info. includes computers, telecommunications, and software deployment

Information Technology (IT)

field of study focused on managing and processing information and the automatic retrieval of information.

computer forensics uses computer systems and technology to

gather potential legal evidence

Autonomy

freedom to work without constant direction and control

Autonomy*

freedom to work without constant direction and control

Crowdfunding helps start-up businesses by

gathering financial contributions from supporters

A ________ is approximately 1 billion bytes.

gigabyte

What is a Design Patent?

granted to anyone who invents a new, original, and ornamental design for an article of manufacture.

What is a Plant Patent?

granted to anyone who invents or discovers and asexually reproduces any distinct and new variety of plants.

Witness Protection

hopes to stop human rights abuses throughout the world

The Witness Project uses the power of video and a grassroots movement to advocate for ________.

human rights

All of the following are parts of a URL EXCEPT:

hyperlinks

Ergonomics

is the science of fitting the workspace to the worker.

The Lanham Act of 1946 (15 U.S.C. Sections 1051-1128.)

is to reduce the likelihood that consumers will be confused by similar marks. !!! was enacted in part to protect manufacturers from losing business to rival companies that used confusingly similar trademarks. - incorporates the common law of trademarks and provides remedies for owners of trademarks who wish to enforce their claims in federal court. - Many states also have trademark statutes. - In 1995, Congress amended the Lanham Act by passing the Federal Trademark Dilution Act

certification mark

is used by one or more persons, other than the owner, to certify the region, materials, mode of manufacture, quality, or other characteristic of specific goods or services - protected by law - Certification marks include such marks as "Good Housekeeping Seal of Approval" and "UL Tested."

Collaborative Consumerism

joining together as a group to use a product more efficiently

Collaborative Consumption*

joining together as a group to use a specific product more efficiently. redistribute things we have purchased, share our lives, share services a product provides instead of owning it outright

Spam

junk mail

Territoriality

laws only apply within borders; can be changed by international agreement (ex. Berne)

The term ________ describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular.

legacy technology

An original work of authorship protected by the U.S. copyright law could include?

literary works musical works including any accompanying words dramatic works including any accompanying music pantomimes and choreographic works pictorial graphic and sculptural work motion pictures and other audiovisual works sound records architectural works

Large, expensive computers that support hundreds of users simultaneously are called ________.

mainframes

Expansion cards fit into slots on the

motherboard

A ________ is approximately 1 million bytes.

megabyte

The ________ contains the central electronic components of the computer.

motherboard

One proposed answer to close the digital divide is to promote ________ as a means for low-income families to access the Internet.

mobile devices

USB ports are fast replacing traditional ________ ports because of their ability to transfer data quickly.

parallel and serial

National Treatment

people from other countries get no worse treatment than nationals; countries in TRIPS can treat nationals no less favorably (regardless of reciprocity)

Devices such as monitors and printers that are connected to the computer are called ________.

peripheral devices

Social Networking tools

played a part in revolutions in 2011

A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.

port

The ________, housed inside the system unit, transforms the wall voltage to the voltages required by the computer chips.

power supply

Data Mining

process of searching huge amounts of data to find a pattern

Data Mining*

process of searching huge amounts of data with the hope of finding a pattern. For inventory control and to be able to respond to consumer buying patterns

Web 2.0 has led to a shift from just consuming content toward

producing content.

What is the stated purpose of the Bayh-Dole act?

promotion of "the utilization of inventions" from federally sponsored research, increasing collaboration between industry and universities, ensuring that federally funded inventions "are used in a manner to promote free competition and enterprise" without unduly encumbering future research and ensuring protection of "the public against nonuse or unreasonable use of inventions."

Law - Copyright

protects the expression gives the copyright holder the following exclusive rights, with some exceptions: To make copies of the work, To produce derivative works: Translations into other languages, Movies based upon the book, To distribute copies, To perform the work in public:

n the URL http://www.prenhall.com, the portion labeled http is the ________.

protocol

A technology named ________ lets any piece of print in the real world host a live link to online information and video content.

quick response codes

Next Einstein Initiative

rallying the support of the world to identify mathematical genius

Cognitive Surplus

results when leisure time and tools allow us to engage in creative acts

social networking tools played a part in what?

revolutions in 2011

A set of programs that searches the Web to find information is called a ________.

search engine

The First Sale Doctrine

section 109(a) of the Copyright Act—also known as the first sale doctrine—provides that "the owner of a particular copy or phonorecord lawfully made under [the Copyright Act], or any person authorized by such owner, is entitled, without the authority of the copyright owner, to sell or otherwise dispose of the possession of that copy or phonorecord." In other words, once a copyright owner sells or gives away a particular copy of a work, the copyright owner no longer has the right to control the distribution of that copy!!!! example: Miranda buys a copyrighted book, such as The Hunger Games by Suzanne Collins. She can legally sell it to another person.

The "s" in https stands for ________.

secure socket layer

Offshored*

sent to other countries. many types of programming jobs have suffered this, but not video game development

By studying the data produced by ________, scientists hope to improve the prediction of weather phenomena.

simulations

The gathering together of groups of people using online tools to connect and exchange ideas is

social networking

What provides a level of instant connection and instant distribution of information that is reshaping the world

social networking tools

Crowdsourcing

solicits online input from consumers

What is an Invention?

something that is new, did not exist before, and is not known to others who have the same ordinary skill in the art to which the invention pertains and is created by independent investigation and experiment.

What does the Rome Convention cover?

sound recordings & broadcasts

Unwanted e-mail is called ________.

spam

Computer forensics analyzes computer systems in gathering potential legal evidence.

true

Education and Technology

students and teachers must have working knowledge of computers now.

What is the EU database protection?

sui generis / protects sweat of the brow

Computer forensics analyzes computer systems in gathering potential legal evidence. true or false

true

The Web is based on the Hypertext Transmit Protocol.

t/f

A(n) ________ is a keyword or term that is assigned to a piece of information such as a Web page, digital image, or video and describes the site so that it can be found again by browsing or searching.

tag

Emotional - Social prosthesis (ESP) device

targeted at helping people who have autism.

AIMS

teaching young minds in Africa so we can use their smarts. African Institute for Mathematical Sciences. Trying to close the digital divide

Quick Response (QR) Codes

technology that lets any piece of print in real world host a live link to online information and video content

if criminal investigators using computer forensics find evidence

the evidence CAN be used in court

All of the following are examples of multimedia EXCEPT:

text

What does the 37 CFR Part 401 Act provide?

that a college or university may retain the patent rights to an invention that is conceived or first reduced to practice in the performace of a federally funded contract, grant or cooperative agreement, with provisions..

Simulation software that can be used in education includes

the Interactive Body.

Children who do not have access to ________ and ________ won't be prepared for future employment.

the Internet, computers

The crisis of growing digital divide is being addressed by what?

the Next Einstein project

Creative Surplus

the ability of the world's populace to volunteer and collaborate on large projects

Creative Surplus*

the ability of the world's populace to volunteer and collaborate on large projects.

A webcast is ________.

the broadcast of audio or video content over the Internet

The digital divide contributes to

the cycle of poverty

Digital Divide

the difference in ease of access to technology

Mastery

the feeling of confidence and excitement from seeing your own skills progress

Data Mining

the process by which great amounts of data are analyzed and investigated. The objective is to spot significant patterns or trends within the data that would otherwise not be obvious

When granting exclusive license rights it is important to retain?

the right to use the invention or the copyrighted work in future research and educational programs and with other - non-profit organizations.

What is a service mark?

the same as a trademark except it identifies and distinguishes the source of a service other than that of a product that is performed by one person for the benefit of a person or persons other than himself, either for pay or otherwise.

Information Technology (IT)

the set of techniques used in processing and retrieving information

Define "useful" in terms of patents

the subject matter of a patent application has to have a useful purpose and must also demonstrate how the subject matter operates.

Purpose

the understanding that you are working for something larger than yourself

Purpose*

the understanding that you are working for something larger than yourself

Video Games

they are best developed for a local market by people native to that market so it won't be offshored

The Internet2 is a project ________.

to develop new Internet technologies

Define NIH'S "unique research resources"

to embrace the full range of tools that scientists use in the laboratory -

America Invents Act (2011)

to prove who invented an item first - the first person to file an application for a patent on a product or process will receive patent protection. - The period of patent protection begins on the date when the patent application is filed, rather than when the patent is issued, which can sometimes be years later. - After the patent period ends (either 14 or 20 years later), the product or process enters the public domain, and anyone can make, sell, or use the invention without paying the patent holder.

Trademark Dilution Revision Act (TDRA)

to state a claim for trademark dilution, a plaintiff must prove the following: 1. The plaintiff owns a famous mark that is distinctive. 2. The defendant has begun using a mark in commerce that allegedly is diluting the famous mark. 3. The similarity between the defendant's mark and the famous mark gives rise to an association between the marks. 4. The association is likely to impair the distinctiveness of the famous mark or harm its reputation. - protect "distinctive" or "famous" trademarks (such as Rolls Royce, McDonald's, and Apple) from certain unauthorized uses even when the use is on noncompeting goods or is unlikely to confuse. - More than half of the states have also enacted trademark dilution laws. - A famous mark may be diluted not only by the use of an identical mark but also by the use of a similar mark.

Crisis Mapping Tool

tool that collects information from emails, texts, blogs, tweets and maps them, making the info instantly available to the public

In the URL http://www.prenhall.com, the portion labeled .com is the ________.

top-level domain

The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.

touch pad

Micro-expressions

training tool software system can train users to recognize emotions

A University of Michigan study shows that without Internet access at home, teens from low income households are more likely to use their cell phones to go online than their wealthier counterparts.

true

A new feature in Excel 2010 that fits a small chart into a single cell is called sparklines.

true

A smartphone is a computer.

true

A subject directory is an outline of Web sites organized by topic.

true

A tag can be assigned to a Web page, a digital image, or a video.

true

A universal chat client allows you to chat with users who are using a different IM service than you are.

true

A wizard is a systemic guide that walks you through the steps necessary to complete a complicated task.

true

Adobe Illustrator is a drawing software application that enables you to create professional-quality creative and technical illustrations.

true

Adobe Illustrator is a type of drawing software.

true

Affective computing is a field of study that attempts to produce machines that understand and can respond to human emotions.

true

Affective computing is a science that attempts to produce machines that understand and can respond to human emotion.

true

All popular social networking sites have privacy policies but you still need to follow certain precautions when using their sites.

true

Although Apple created the Safari browser, there is a Windows-based version available.

true

Any flat surface can become an input device using SixSense.

true

Any surface can become an input device using SixthSense.

true

Apple's Final Cut Pro is an example of software that enables you to edit video.

true

At the Wake Forest Institute for Regenerative Medicine, researchers use a desktop printer to create human organs?

true

Becoming computer literate means knowing which technologies are on the horizon and how to integrate them with your home setup.

true

Being computer literate means being able to separate the real privacy and security risks from things that you don't have to worry about.

true

Biomedical chip implants are being used to provide sight to the blind.

true

Bits and bytes are used to represent the quantity of data and information the computer inputs and outputs.

true

Cognitive surplus is the combination of leisure time and creativity tools.

true

Wizards are step-by-step guides for performing complicated tasks in application software.

ture

Economic Espionage Act

which made the theft of trade secrets a federal crime.

One way to mark a Web site so that you can return to it later without typing the address is to ________.

use Favorites or Bookmarks

Arbitrary trademarks

use common words that would not ordinarily be associated with the product, such as Dutch Boy as a name for paint.

artists interface with technology often but cannot yet

use software to suggest plot endings

Swap.com

usees power of peer to peer connections to find best set of matches for people to trade things.

Witness Project

uses cameras and video to "See it. Film It. Change It."

A(n) BLANK card often has its own RAM and processor to speed up graphics processing.

video

SixthSense

wearable device hanging around your neck that has a camera a projector and a mirror that communicates with the internet over bluetooth through the cell phone in your pocket. It AUGMENTS REALITY by giving you info as you need it.

collaborative consumption is

when people get together to increase the use of a single product by sharing access to it

Federal Trademark Dilution Act

which allowed trademark owners to bring a suit in federal court for trademark dilution. - In 2006, Congress further amended the law on trademark dilution by passing the Trademark Dilution Revision Act (TDRA)

the Computer Software Copyright Act (1980_

which amended the Copyright Act to include computer programs in the list of creative works protected by federal copyright law. Generally, copyright protection extends to those parts of a computer program that can be read by humans, such as the "high-level" language of a source code. Protection also extends to the binary-language object code, which is readable only by the computer, and to such elements as the overall structure, sequence, and organization of a program. Not all aspects of software are protected, however. Courts typically have not extended copyright protection to the "look and feel"—the general appearance, command structure, video images, menus, windows, and other screen displays—of computer programs.

Uniform Trade Secrets Act

which has been adopted in forty-seven states.


Conjuntos de estudio relacionados

Day 1 kinesiology: head, neck and face

View Set

chp. 11: The Renaissance / section 1

View Set

Бухгалтерський облік (тести)

View Set

basics of capital budgeting 2: WACC

View Set

Operations Management Smartbook Study Guide

View Set

NURS 223 Exam 2 Practice Questions

View Set