Ethics 6

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

18. The ____ Act enacted in 1999, allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts. a. Anticybersquatting Consumer Protection c. Economic Espionage b. PRO-IP d. CAN-SPAM

A

20. The ____ requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations. a. TRIPS agreement c. PRO-IP Act b. Digital Millennium Copyright Act d. WIPO Copyright Agreement

A

9. The concept that an idea cannot be copyrighted but the ____ of an idea can be is key to understanding copyright protection. a. expression c. variation b. summary d. illustration

A

1. In 1995, the term for a U.S. patent was modified from 17 years from issuance to ____ years from filing. a. 15 c. 25 b. 20 d. 30

B

15. Unlike traditional copyright law, the ____ does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use. a. TRIPS Act c. WIPO Copyright Act b. Digital Millennium Copyright Act d. PRO-IP Act

B

19. A legislator and former singer and entertainer who co-sponsored the Copyright Term Extension Act. a. Frank Sinatra c. Dean Martin b. Sonny Bono d. Sammy Davis Jr.

B

21. A patented process or invention that is surreptitiously included within a standard without being made public until after the standard is broadly adopted is called a(n) ____. a. patent troll c. patent standard b. submarine patent d. patent farm

B

26. Cybersquatters ____. a. frequently launch denial-of-service attacks against popular Web sites b. register domain names for famous trademarks or company names to which they have no connection c. remain connected to popular Web sites for extremely long periods of time making it difficult for others to obtain service d. employ phishing tactics using the domain names of popular Web sites

B

30. ____ occurs when someone copies a substantial and material part of another's copyrighted work without permission. a. Plagiarism c. Reverse engineering b. Copyright infringement d. Patent trolling

B

6. The U.S. Supreme Court has ruled that there are ____ classes of items that cannot be patented. a. two c. four b. three d. five

B

8. Patents are issued by the ____. a. USPS c. FTC b. USPTO d. SEC

B

16. ____ allows portions of copyrighted materials to be used without permission under certain circumstances. a. Plagiarism c. Fair use doctrine b. Copyright infringement d. Use of prior art

C

22. ____ can qualify for trade secret protection under the Uniform Trade Secrets Act. a. Only computer hardware c. Both computer hardware and software b. Only computer software d. Neither computer hardware and software

C

25. A(n) ____ is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's. a. trade secret c. trademark b. watermark d. earmark

C

29. Legally obtained information that is gathered to help a company gain an advantage over its rivals is called ____. a. prior art c. competitive intelligence b. industrial espionage d. trade secrets

C

3. Some software experts think that too many software patents are being granted, inhibiting new software development. For example, ____ obtained a patent for "one-click shopping," based on the use of a shopping cart purchase system for electronic commerce. a. eBay c. Amazon.com b. Dell d. Microsoft

C

4. The process of taking something apart in order to understand it, build a copy of it, or improve it is called ____. a. plagiarism c. reverse engineering b. patent infringement d. decompiling

C

7. Copyright and patent protection was established through ____. a. the Bill of Rights c. the U.S. Constitution b. the U.S. Federal Codes and Statutes d. various state laws

C

10. The ____ enables a DVD player to decrypt, unscramble, and play back motion pictures on DVDs, but not copy them. a. Time Warner Cable system c. DeCSS b. RIAA d. Content Scramble System

D

11. The PRO-IP Act sends the message to intellectual property criminals everywhere that the U.S. will ____ to protect American innovation. a. do very little c. negotiate with violators b. use copyrights and patents d. go the extra mile

D

12. The Agreement on Trade-Related Aspects of Intellectual Property Rights, also know as the ____ , established the minimum levels of protection that each country must provide to all WTO members. a. WTO c. WIPO b. DMCA d. TRIPS

D

13. A(n) ____ can read the machine language of a software program and produce the source code. a. compiler c. re-engineering device b. open source decoder d. decompiler

D

14. A(n) ____ prohibits a departing employee from working for any competitors for a period of time. a. noncompete agreement c. nondisclosure agreement b. employee contract d. nonemployment agreement

D

17. One of the tests that an invention must pass to be eligible for a patent is ____. a. it must be a machine b. it must be economical to produce c. it must be capable of providing economic benefit d. it must not be obvious to a person having ordinary skill in the same field

D

2. These objects are protected under patent law: ____. a. art and film b. information critical to an organization's success c. books and movies d. inventions

D

23. Firefox and OpenOffice are all examples of ____. a. Web browsers b. utility software c. products developed through re-engineering d. open source software

D

24. One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is ____. a. the time limitation for a trade secret is longer than for patents and copyrights b. no royalties must be paid on trade secrets c. trade secrets can become part of the prior art and be used to protect patents and copyrights d. there is no need to file an application or disclose the trade secret to gain protection

D

27. The courts have ruled in favor of using reverse engineering to enable ____. a. avoid domination of a particular software market by a single manufacturer b. creation of open source code c. to circumvent restrictive trade secrets d. interoperability

D

28. The basic premise behind open source code is that when many programmers can read, redistribute, and modify a program's code, the software ____. a. becomes easier to use c. is more fun to maintain b. costs less d. improves

D

5. ____ refers to the existing body of knowledge available to a person of ordinary skill in the art. a. Prior experience c. Body of practice b. Known facts d. Prior art

D

The Leahy-Smith America Invents Act

changed the U.S. patent system from a "first-to-invent" to a "first-inventor-to file" system; expanded definition of prior art


Kaugnay na mga set ng pag-aaral

Ch 9 Wong: Infant & Family Health Promotion

View Set

Newton's Third Law of Motion - Action and Reaction

View Set

Chapter 22: Transition to Parenthood*, Chapter 21 Nursing Care of the Family During Postpartum Period Lowdermilk*, Chapter 33: Postpartum Complications, Lowdermilk 11th Ed. Chapter 32: Labor and Birth Complications, Lowdermilk-Ch. 20

View Set

Combo with "Accounting Chapter 15 test bank" and 3 others

View Set

MKT 2500 Exam 3 (Ch 6, 12, 13, 16, 17)

View Set

Nutrition: Lipids and Cardiovascular Disease

View Set