CGS1060C
What two ways can reduction to practice occur?
"Actual reduction ot practice" occurs when the invention in built an tested. "Constructive reduction to practice" occurs with the filing of a patent application tthat meets the statutory requirements.
What are the four main components of PIPA (Protect Internet Protocol Act) and SOPA (Stop Online Privacy Act)?
1. Cut off ISP 2. Stop payment processors 3. Stop illegal ads 4. Force filters on search engines
In the Web address www.facebook.com, Facebook is the top-level domain
False
Web-based databases are being used to help investigators solve criminal cases
True
Web-based databases are being used to help investigators solve criminal cases. True or False
True
________ microphones pick up sound from only one direction.
Unidirectional
1111
What is the binary representation of the number 15?
Firewire
What is the name of Apple Inc.'s name for the IEEE 1394 High Speed Serial bus?
The Internet is ________.
a large network of networks
Define fair use
a limitation and exception to the exclusive right granted by copyright law to the author of a creative work. In United States copyright law, fair use is a doctrine that permits limited use of copyrighted material without acquiring permission from the rights holders.
Define Process in relation to patents
a process, art or method, and includes a new use, primarily of industrial or technical processes.
Search engines have which three parts?
a spider, an indexer, and search engine software
________ computing relates to emotion or deliberately tries to influence emotion. a. Affective b. Personal c. Psychological d. Emotional
a. Affective
Spam*
electronic junk mail
A digicam sits on your computer monitor and is used primarily ofr transmitting live video.
false
A full software installation enables you to choose which features you want installed on your hard drive.
false
A study by the National Research Council concludes that by the year 2030, computers will displace humans in 85 percent of the current occupations.
false
A typical CD stores between 10-15 songs in uncompressed format but 300-400 in MP3 format.
false
Light-emitting diode technology uses organic compounds that produce light when exposed to an electric current.
false
Affecive computing is a field of study focused on managing and processing information and the automatic retrieval of information.
false
The area that holds all of the instructions the computer needs to start up is RAM.
false
All Web-based software is free.
false
Angel is a gaming software.
false
Social networking
is incorporated as part of political strategy by many politicians.
Software
set of computer programs that tells computer what to do and enables it to perform different tasks
Monitor screen grids are made up of millions of pixels, with each pixel containing ________ subpixels of colors.
three
How do we connect in the technology age?
through music, there are new ways with Google Street View (apply music with pictures to evoke emotional memories) and now we report the news (DYTHR)
Desktop publishing software enables you to create brochures and flyers.
true
Proprietary software is applications that you must purchase.
true
The most common compressed digital format is MP3.
true
VeriMed can be used to keep Alzheimer patients safe.
true
When purchasing video-editing software, you should purchase the least expensive application with the greatest number of supported file formats.
true
A Web site that allows anyone to add or edit content is called a ________.
wiki
Psychology and Technology
working to develop computers that can respond to human emotional expression and to have computers have emotional and social skills affective computing
Secure Online Shopping
1) The beginning of the URL changes from Http to https 2) The site displays a seal from a reputable third-party web security company 3) A small icon of a closed padlock appears on the toolbar 4) Use your common sense and shop at well-known, reputable sites.
What is a U.S. Trademark
a word, name, symbol or device that it identifies and distinguishes the source of a service orther than that of a product that is performed by one person for the benefit of a person or persons other than himself, either for pay or otherwise.
Social media
is incorporated as part of a political strategy by many politicians
The difference between people with access to computers and the Internet and those without this access is known as the ________.
digital divide
Multimedia tours using mobile devices and wireless technology are not common in museums and galleries at this time.
false
You cannot be called computer literate unless you have knowledge of higher level computer skills, such as computer programming.
false
You cannot be computer literate unless you have knowledge of higher level computer skills, such as computer programming.
false
What Is Patentable?
"[w]hoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title." - to be patentable, an invention must be novel, useful, and not obvious in light of current technology. - Plants that are reproduced asexually (by means other than from seed), such as hybrid or genetically engineered plants, are patentable in the United States, as are genetically engineered (or cloned) microorganisms and animals.
Web 2.0 has led to a shift from just consuming content toward
producing content
Elements of a Parody Defense
-A host work which the target audience recognizes; -A derivative work which is transformative and -Parodies the host work; -The creator of the derivative work uses only as much of the host work to bring to mind that work; and -No likelihood of significant market harm.
A(n) ________ is a device that looks like a skinny pen but has no ink.
stylus
External hard drives are often used to back up data that is contained on the internal hard drive.
true
If you draw a watch-sized circle on your wrist, SixthSense will display an analog watch face on your arm.
true
If you post a picture on your own social networking site, it could become available to the public via search engines.
true
In reference to URLs, domain name and host name are used interchangeably.
true
In reference to URLs, the domain name identifies the sites host.
true
Information technology is the study of managing and processing information, and the automatic retrieval of information.
true
Information technology is the study of managing and processing information, and the automatic retrieval of information. false or true
true
Joysticks and steering wheels are examples of game controllers.
true
Keyboards that display on screen when input of text is required are known as virtual keyboards.
true
Mastery of software programs such as Adobe Illustrator and Corel Painter is essential to creating digital art.
true
Mastery of software programs, such as Adobe Illustrator and Corel Painter, is essential to creating digital art,
true
Mastery of software programs, such as Adobe Illustrator and Corel Painter, is essential to creating digital art. true or false
true
Modern printers feature Bluetooth connectivity technology.
true
Most webcasts are not updated automatically.
true
Most word processing programs come with a search and replace tool that enables you to locate and replace specific text.
true
On a keyboard, Num Lock and Caps Lock are both toggle keys.
true
One of the new capabilities of PowerPoint 2010 enables you to trim video clips without a separate video-editing program.
true
OpenOffice.org is an example of open source software.
true
Processing is manipulating, calculating, or organizing data into information.
true
Serial ports and parallel ports have long been used to connect input and output devices to the computer
true
Serial ports and parallel ports have long been used to connect input and output devices to the computer.
true
Social networks are often used to advertise job openings.
true
Software as a Service (SaaS) is a Web-based application.
true
Some applications and operating systems allow you to program a series of tasks and associate that series of tasks with specific set of keystrokes.
true
VeriMed can be used to keep Alzheimer patients safe. true or false
true
ineligible trademarks
-Someone already owns it -Descriptive (and no secondary meaning) -Misdescriptive (AND customers likely to believe the misdescription) -"Primarily merely" surnames or geographic (unless the name has acquired secondary meaning) -"Immoral, deceptive or scandalous"
what trademark is protected by
-State common law -State statutes -Federal statute (Lanham Act)
copyright rights
-Use -Copy -Distribute -Display and perform the work publicly -Transmit digitally -Create derivative works -Prohibit above actions
Retroactivity? Analytical framework for copyrighting something in public domain.
1. Foreign country copyright 2.in PD b/c failure to comply w/ formalities 3. Author in elgible country 4. work first published in elgible country (or 30days)
What are 7 types of intellectual property protected under and the uses and rights of the owner are defined by appropriate state, federal and international laws?
1. Inventions 2. works of authorship 3. Trade secretes 4. Trademarks 5. Service Marks 6. Plant Patents 7. Mask works
Patent statute limits the patentable subject matter by excluding what three things?
1. Laws of Nature 2. Physical phenomena 3. Abstract Ideas
What 3 Conditions are needed for Fair Use?
1. Only applies in special cases 2. Can't conflict w/ normal exploitation of work 3. Cannot unreasonably prejudice legit interests of right's holder
The Virtual Choir showed that people have the means to collaborate easily internationally. (T/F)
True
The hard drive is an example of a nonvolatile storage device.
True
The information in e-mail is no more private than a postcard
True
The move toward access instead of ownership is a sign of collaborative consumption.
True
The move toward access instead of ownership is a sign of collaborative consumption. True or False
True
The move toward access instead of ownership is a sign of collaborative consumption. (T or F)
True
There are sites that host blogs free of charge.
True
True or false The move toward access instead of ownership is a sign of collaborative consumption
True
True or false Virtual reality is the addition of info-graphics to your visual field
True
Virtual reality is the addition of graphical information to your visual field. True or False
True
Web-based databases are being used to help investigators solve criminal cases. (T or F)
True
What are five advantages to registering a Copyright?
1. Registration establishes a public record of the copyright claim. 2. Before an infringement suit may be filed, registration is necessary for works of U.S. Origin. 3.If registration is made within 5 years of publication, registration will establish prima facie evidence in court of the validity of the copyright and of the facts stated in the registration certificate. 4. If registration is made within 3 months after publication of the work or prior to an infringment of the work, statutory damages and attorney fees will be available to the copyright owner in court actions for infringement . Otherwise, only an award of actual damages and profits is available to the copyright owner. 5. Registration allows the owner of the copyright to record the registration with the U.S. Customs Service for protection against the importation of infringing copies.
What should an invention disclosure report contain?
1. The identification of the funding source 2. The inventors 3. Sufficient technical detail about the invention 4. Any publication or other public use that might impact patentability. 5. The inventive periods 6. Other sources of funding or materials
What case shows that the primary purpose of copyright is to promote science and useful arts- not rewarding labor?
Feist (phone books case)
Social media
is incorporated as part of a political strategy by many politicians.
How are arts and computers related?
need to know how to manage a website for selling your art. new experiences for audiences such as dance movements that are computer generated. Mastery software suchas Adobe Illustrator and photoshop is essential for creating digital art
A ________ enables your computer to connect to other computers or to the Internet.
network interface card (NIC)
What is the requirement for originality in Canada?
no creativity needed, BUT need exercise skill and judgment
Khan Accademy
nonprofit website that has videos to teach students. Also has automated testing following each video series so students can try similar problems until show mastery. teacher can follow what is happening in the classroom too so knows how exactly to help students
The hard drive is a ________ storage device, meaning that it stores data permanently even when the computer is turned off.
nonvolatile
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.
plug-ins
Define Manufacture in terms of patents
refers to articles that are made, and includes all manufactured articles
Intellectual Property
refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.
Software
refers to the commands that instruct a computer what to do
Define "composition of matter" under patent law
relates to chemical compositions and may include mixtures of ingredients as well as new chemical compounds. Software, business methods, and life forms have been found to be patentable subject matter.
Social Networking*
the gathering together of groups of people using online tools to connect and exchange ideas
Computer programs can add muscles, fat, and skin to recovered human skulls to help identify the victim.
true
Computer systems fun at speeds measured in gighertz.
true
Computers work exclusively with numbers.
true
Coordinated colors and styles in a word processing program is known as a theme.
true
Dancers can be wired with light electronic sensors so that their movements can be digitized for computer analysis.
true
Dancers can be wired with light electronic sensors so that their movements can be digitized for computer analysis. true or false
true
Data mining is the process of searching huge amounts of data with the hope of finding a pattern.
true
Data mining is the process of searching huge amounts of data with the hope of finding a pattern. true or false
true
Data mining is the process of searching large datasets to find patterns.
true
Embedded computers have their own programming. They typically do not receive input from you, nor do they interact with other systems
true
Examples of information technology careers are telecommunication and software deployment.
true
Examples of information technology careers are telecommunication and software deployment. true or false
true
External hard drives are often used to back up data that are contained on the internal hard drive.
true
Information technology is the study of managing and processing information, and the automatic retrieval of information. true or false
true
Some art museums use technology to let you download informational podcasts to listen to while touring exhibits.
true
Some art museums use technology to let you download informational podcasts to listen to while touring the exhibits. true or false
true
Tagging enables you to share your favorite Web site with others.
true
The Internet can be said to be a result of the Cold War.
true
The Internet is the largest computer network in the world.
true
The Microexpression Training Tool software trains law enforcement officials to distinguish true emotion from deception.
true
The National Center for the Analysis of Violent Crime database enables detectives to analyze information about similarities between crimes.
true
The National Center for the Analysis of Violent database enables detectives to analyze information about similarities between crimes.
true
The central processing unit controls all the functions performed by the computer's other components and processes all the commands issued to it by software instructions.'
true
The connectivity port that uses a standard phone line connection is the modem port.
true
The front end of cloud computing is the side we see as users.
true
The operating system provides the means for users to interact with a computer.
true
The primary benefit of spreadsheet software is its capability to automatically recalculate formulas and functions.
true
There are free blog hosting sites.
true
Trillian and Digsby are universal chat services that you install on your computer so that you can chat with users of all popular IMs.
true
USB ports are causing serial and parallel ports to become legacy technology.
true
Understanding how to use e-mail effectively is one example of what it means to be computer literate.
true
Webcasts can be used to initiate a response from a viewing audience.
true
Weblogs or blogs are public, allowing anyone to view them.
true
When evaluating a Web site, testing the relevancy of a site means checking to see if the information in the site is current.
true
When evaluating a Web site, testing the relevancy of a site means checking to see whether the information in the site is current.
true
When using Windows 7 power management tools, you really only need to shut down your computer when you need to repair the system, install hardware, or move the system.
true
With a client-based e-mail account, such as Microsoft Outlook, you are able to view your e-mail only from the computer on which the client program is installed.
true
Word processing software enables you to easily change the appearance and organization of your documents.
true
You can use a word processing program to translate words or phrases to another language.
true
Computer technology is used in the arts by
creating web pages to advertise and sell art. creating multimedia museum tours. integrating it into new works of performance art.
________ is described as the ability of the world's populace to volunteer and collaborate on large projects.
creative surplus
Stop Counterfeiting in Manufactured Goods Act (SCMGA)
enacted by congress in 2006 to combat counterfeit goods - The act made it a crime to intentionally traffic in, or attempt to traffic in, counterfeit goods or services, or to knowingly use a counterfeit mark on or in connection with goods or services. - Before this act, the law did not prohibit the creation or shipment of counterfeit labels that were not attached to any product. Therefore, counterfeiters would make labels and packaging bearing a fake trademark, ship the labels to another location, and then affix them to inferior products to deceive buyers. The SCMGA closed this loophole by making it a crime to traffic in counterfeit labels, stickers, packaging, and the like, whether or not they are attached to goods.
service mark
essentially a trademark that is used to distinguish the services (rather than the products) of one person or company from those of another. - For instance, each airline has a particular mark or symbol associated with its name. - Titles and character names used in radio and television are frequently registered as service marks.
Ushahidi
example of crisis mapping tool. Developed In Kenya when a Okolloh was overwhelmed with messages about the violence. Later SwiftRiver was developed which rates the submissions and quality of info for accurateness.
Cognitive surplus means that we now find many people with
excess time and free tools for collaboration
Used to add enhanced sound and video to a computer
expansion card
What is the requirement for originality in France?
expresses author's personality
Digestible microchips
have embedded sensors to transmit information to physicians.
The Internet backbone refers to ________.
he main pathway of high-speed communications lines through which all Internet traffic flows
The CPU is often covered by a(n) BLANK, which dissipates the heat generated by the chip.
heat sink
software*
instructions that tell your computer what to do. install the right ones to avoid online annoyances
Autonomy
working without continual direction and control
Microsoft's spreadsheet software is called Calc.
false
One bit is equal to eight bytes.
false
Restarting the computer while it's powered on is called a cold boot.
false
SixthSense is a wearable device that consists of a camera, projector, and a mirror that can communicate with the Internet over wireless Bluetooth via a computer.
false
System software is the software you use to do tasks at home, school, or work.
false
The # sign can be used as a wildcard when conducting searches with most search engines.
false
The Google search engine can process more than 3 petabytes of user-generated data per hour.
false
The Internet protocol used to upload and download files is HTTP.
false
The Internet was developed to ensure faster delivery of communications such as mail.
false
The first no-glasses 3-D laptop was introduced in late 2011 by Dell.
false
The for-profit Khan Academy contains over 2,200 videos, and over 1 million students a month use the site.
false
The menuboard of the Khan Academy shows exactly which topic a student has mastered and where they are failing to progress. Answer
false
The motivation behind discount cards offered by grocery stores and drugstores is to encourage customers to frequent their stores.
false
The primary use for the Internet is searching.
false
The unique address for a particular Web site is the domain name.
false
There are virtually no privacy risks in using today's newest social networking sites.
false
Using your mobile devices to make purchases is more risky than making purchases with your computer on the Web.
false
Web 2.0 is classified as passively browsing Web pages created for us.
false
Web-based e-mail programs are usually more full featured than client-based e-mail systems.
false
When a job is sent to other countries, as many programming jobs have been, it is said to have been data mined.
false
When a job is sent to other countries, like many programming jobs have been, it is said to have been data mined.
false
When performing data entry, you cannot use the numeric keypad on your keyboard to enter numeric values.
false
When shopping on the Web, it is better to pay for your purchase with a debit card rather than a credit card.
false
When uninstalling software, it is best simply to open the Explorer window and delete the folder containing the software.
false
Wikipedia is a good source for a research paper.
false
You cannot be computer literate unless you have knowledge of higher level computer skills, such as computer programming. true or false
false
ZipCar is an example of ownership.
false
ZipCar is an example of ownership. true or false
false
Computer Literate
familiar enough with computers that you understand their capabilities and limitations and know how to use them efficiently
Being computer literate means you know how to solve any computer problem. (T/F)
False
The largest storage space in your computer is provided by the
hard drive
Any computer parts that you can actually touch are considered to be ________.
hardware
Data mining
important now because it is so easy to gather enormous data sets, the study of data using algorithms to detect patterns, the translation of Big data sets into meaningful information
Data mining is
important now because it is so easy to gather enormous data sets. the translation of Big Data sets into meaningful information. the study of data using algorithms to detect patterns.
Fanciful trademarks
include invented words, such as Xerox for one manufacturer's copiers and Google for search engines.
Social media has been used to
increase communication between elected officials and their constituents, replace television and radio advertising in political elections, increase voter turnout in elections
Social media has been used to
increase communication between elected officials and their constituents. increase voter turnout in elections. replace television and radio advertising in political elections.
Collaborative consumption is when people get together to
increase the use of a single product by sharing access to it
Collaborative consumption is when people get together to
increase the use of a single product by sharing access to it.
studies reveal that human motivation is fostered by
increasing levels of mastery, ability to self direct, and directing your work toward a higher goal than just your own needs
IT is the abbreviation for
information technology
A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer
input device
Hardware
Computer printers and other devices
Studies reveal that human motivation is fostered by
All of the above
STLYUS
An input device that looks like a pen but has no ink
HARDWARE
Any part of the computer that you can physically touch
What feature is a list of pages you've visited within a Web site?
Breadcrumb trail
Ushahidi
Crisis Mapping Tool
TRUE
Current computer systems run at speeds measured in gigahertz (GHz).
HTTP is the abbreviation for ________.
Hypertext Transfer Protocol
IT is the abbreviation for
Information Technology
What is a Gigabyte
One billion bytes
Is incorporated as part of a political strategy by many politicians
Social Media
Web 2.0
Tools and web-based services that emphasize online collaboration and sharing among users
video expansion card
Video ports are found on the __________.
Hard drive
Which device has the largest storage space in a computer?
Researchers believe that microchips may one day
be able to restore sight to the blind
Inkjet printers and laser printers are examples of ________ printers.
nonimpact
what can forecast tornadoes within minutes?
supercomputers
What can be Copyrighted?
-"Original works of authorship"; need the element of creativity, even if slight -Only the expression is protected
TRUE
An example of a connectivity port is an Ethernet port.
What treaty deals with Copyright?
Berne (1886)
________ is data that has been organized or presented in a meaningful fashion.
Information
Examples of crowdfunding and crowdsourcing include
KIckstarter and MobileVoice.
How long is US copyright?
Life of author + 70 years?
BYTE
One character of data
Which is NOT important to consider when buying a printer?
Paper
All the following are examples of input devices EXCEPT a ________.
Printer
What does SOPA stand for?
Stop Online Privacy Act
Recognition/Enforcement of Foreign Judgments? (Which factors?)
(1) Does foreign court have jurisdiction? (2) Was D. properly served? (3) Was there fraud? (4) foreign judgment against public policy
For a U.S. patent to be "novel" the invention must , prior to filing of a patent application be?
(a) Not known or used by others in the U.S or (b) patented or described in a printed publication.
Requirements for Trademark
-Distinctive -Used in commerce -Used in interstate commerce, for federal law protection
requirements for copyright
-Element of creativity in the host work -Copying of the expression, not just of the facts. This means that works of fiction are more thoroughly protected than factual accounts. -Whether the work has both copyrightable and non-copyrightable elements. -Fixed in a "tangible medium of expression" "now known or later developed" -Work is fixed if: it "can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device."
levels of distinction
-Generic: No TM - you can't control the ordinary word for a product -Descriptive: Only if it acquires secondary meaning- consider whether consuming public primarily associates that mark with a particular producer. -Suggestive: Evokes or suggests a characteristic of the underlying good. -Arbitrary or fanciful: Word has no logical relationship to underlying product.
Trade secret
-Information not generally known or readily ascertainable; -Developed through some investment by the owner/plaintiff; -That provides a firm with competitive advantage; -Owner/plaintiff takes reasonable steps to keep it secret; and -Defendant discovers the secret through improper means.
Remedies for trademark
-Injunction -Damages (D's profits; P's loss; possibly costs of suit and treble damages) -For dilution, damages only available if D willfully traded on P's goodwill (but still can get injunction)
Remedies for copyright infringement
-Injunction -Statutory Damages -Plaintiff's Damages (amt plaintiff lost) -Defendant's Profits -Impoundment (and eventual destruction) -Criminal penalties -Attorney's fees
Elements of a fair use defense
-Nature of the host work (original=fact-based) -Is the derivative work transformative? -How much of the host work was used? -Effect of the derivative work on potential market for or value of the host work -Defendant's motive -First Amendment implication
Dilution
-Used when there is no competition between the parties and consumers are not likely to be confused about the origin of goods (but really remote goods - "lipstick and steamshovels" makes a claim less compelling) -Protects the reputation and goodwill value of the trademark -Three protected interests: Right of the prior user to enter a related field (expansion doctrine); Right to protect its reputation from (likely) association with inferior goods ("tarnishment"); and Right of the public to be free from (likely) confusion between the marks ("blurring").
elements for copyright infringement
-You own the valid copyright to the work (elements you claim were infringed) -The works are materially similar (so that an average observer would see that) -The defendant copied from your copyrighted work -The defendant used one of your copyright rights without your permission
fair use: trademark
-affirmative defense against trademark infringement/dilution -Nominative use; -Comparative advertising; -News reporting; -Parody.
Trademark Infringement
-plaintiff owns a valid mark -defendant used it or a similar symbol in connection with the sale, offering for sale, distribution or advertising of good or services and -the use caused likelihood of confusion, mistake or deception about the origin, sponsorship or approval of the goods or services.
What are the 37 CFR Part 401 provisions?
1. The institution has a written agreeement with its researchers, including student, requiring disclosure and assignment of any subject invention. 2. The institution discloses the invention to the funding agnecy within a reasonable time after it becomes known to the institution. 3. Within two years of disclosure to the funding agency, and prior to the expiration of any statutory patent filing period, the institution files with the fuding agency a written election to take title to the patent.
What are the three types of patents?
1. Utility Patent 2. Design Patent 3. Plant Patent
What are the two types of U.S. patent applications?
1. non-provisional or full patent application 2. provisional patent application
International Protections
1. the Berne Convention 2. the Trade-Related Aspects of Intellectual Property Rights (known as the TRIPS agreement) 3. the Madrid Protocol 4. the Anti-Counterfeiting Trade Agreement
If a copyright notice is used what should it contain?
1. the copyright symbol or the word "Copyright" or the abbreviation "Copr" 2. the year of first publication of the work: and the name of the owner of the copyright.
How many countries are members of TRIPS?
153
Autonomy
1st factor that leads to greater motivation
Purpose
2nd factor that leads to greater motivation
Mastery
3rd factor that leads to greater motivation
What are the 37 CFR Part 401 provisions?
4. Within one year of election to take title or sooner if necessary to obtain valid patent protection, the institution files a patent application. In the case of biological materials, the NIH has crated an alternative process that allows the institution to retain title without filing a patent application. 5. The institution shares royalties with the inventor
What are the 37 CFR Part 401 provisions?
6. The institution devotes any net revenue fromt he intention to the suport of scientific research or education. 7. Certain provisions of theAct have direct implications for what may be offered to an industrial sponsor of research. 8. If the institution declines to take title to the subject invention or fails to follow the provisions of the Act, the funding agnecy may elect to takke title to the patent or may agree to vest title in the inventor.
How long does copyright protection last for jointly authored works?
70 years after the last surviving author's death.
What are the 37 CFR Part 401 provisions?
9. The institution may not unilaterally assign its rights to the invention to anyone except an entity that specializes in the managment of inventions. 10. Research projects entirely funded by a non-governmental sponsor are exempt from Bayh-Dole: however, reserach projects partially funded by a Federal grant are governed by the Act. 11. The government retains a rotyalty-free, non-exclusive license for government purposes. There is a preference for licenses to small business and, for exclusive licenes, U. S. manufacturers.
How long does copyright protection last for works authored as a result of a written contract or made-for-hire, anonymous or pseudonymous works?
95 Years from publication or 120 years from creation, whichever time period is shorter.
Distinctiveness of the Mark
A central objective of the Lanham Act is to reduce the likelihood that consumers will be confused by similar marks. - For that reason, only those trademarks that are deemed sufficiently distinctive from all competing trademarks will be protected. - In addition, a trademark may not be derogatory to a person, institution, belief, or national symbol. - example: A controversial issue in trademark law has to do with the use of slang terms for American Indians, such as "redskins" and "braves." Many Native Americans find the use of these names offensive.
Augmented Reality
A combination of our normal sense of the objects around us with an overlay of information displayed
Augmented Reality
A combination of our normal sense of the objects around us with an overlay of information displayed.
binary digit (bit)
A digit that corresponds to the on and off states of a computer's switches. A bit contains a value of either 0 or 1.
trademark
A distinctive word, symbol, or design that identifies the manufacturer as the source of particular goods and distinguishes its products from those made or sold by others. - At common law, the person who used a symbol or mark to identify a business or product was protected in the use of that trademark. - by using another's trademark, a business could lead consumers to believe that its goods were made by the other business.
What is a Copyright?
A form of protection that is provided for under the U.S. constitution to the authors of an "original work of authorship: that is in a tangible form.
trade secret
A formula, device, idea, process, or other information used in a business that gives the owner a competitive advantage in the marketplace. The law of trade secrets protects some business processes and information that are not or cannot be protected under patent, copyright, or trademark law against appropriation by a competitor. information of commercial value Trade secrets may include customer lists, plans, research and development, pricing information, marketing techniques, and production methods—anything that makes an individual company unique and that would have value to a competitor. there are no registration or filing requirements for trade secrets, trade secret protection may be well suited for software.) Of course, the secret formula, method, or other information must be disclosed to some persons, particularly to key employees. Businesses generally attempt to protect their trade secrets by having all employees who use the process or information agree in their contracts, or in confidentiality agreements, never to divulge it.
mainframe
A large, expensive computer that supports hundreds of users simultaneously is a(n) __________.
collective mark
A mark used by members of a cooperative, association, union, or other organization to certify the region, materials, mode of manufacture, quality, or other characteristic of specific goods or services. - Collective marks appear at the end of a movie's credits to indicate the various associations and organizations that participated in making the movie. The labor union marks found on the tags of certain products are also collective marks.
Social Networking
A means by which people use the Internet to communicate and share information among their immediate friends, and meet and connect with others through common interests, experiences, and friends.
Social Networking
A means by which people use the internet to communicate and share information among their immediate friends and to meet and connect with others through common interests, experiences, and friends
trade name
A name that a business uses to identify itself and its brand. - A trade name that is the same as the company's trademarked product is protected as a trademark, and unique trade names are protected under the common law. - Trade names may be protected as trademarks if the trade name is the same as the company's trademarked product—for example, Coca-Cola. - Unless it is also used as a trademark or service mark, a trade name cannot be registered with the federal government. - Trade names are protected under the common law, however. - As with trademarks, words must be unusual or fancifully used if they are to be protected as trade names. - For instance, the courts held that the word Safeway was sufficiently fanciful to obtain protection as a trade name for a grocery chain.
TRUE
A network interface card enables your computer to connect with other computers or to a cable modem to facilitate a high-speed Internet connection.
maintains data even when the computer's power is turned off
A nonvolatile storage device __________.
Skype
A popular Voice over Internet Protocol (VoIP) service
TRUE
A port is a place through which a peripheral device attaches to the computer so that data can be exchanged between it and the operating system.
Business-to-business (B2B)
A portion of e-commerce that consists of businesses buying and selling goods and services to other businesses
Consumer-to-consumer (C2C)
A portion of e-commerce that consists of consumers selling to each other through online auction and exchanges sites
Business-to-consumer (B2C)
A portion of e-commerce where exchanges take place between businesses and consumers-such as the purchases that consumers make at online stores
TRUE
A projector is a device that can project images from your computer on the wall.
patent
A property right granted by the federal government that gives an inventor an exclusive right to make, use, sell, or offer to sell an invention in the United States for a limited time. - a grant from the government that gives an inventor the exclusive right to make, use, and sell an invention for a period of 20 years. - Patents for designs, as opposed to inventions, are given for a 14 year period.
Social commerce
A subset of e-commerce that uses social networks to assist in marketing and purchasing products
FALSE
A surround-sound speaker is a system of speakers and audio processing that envelopes the listener in a 180-degree field of sound.
QR Codes
A technology that lets any piece of print in the real world host a live link to online information and video content.
Crisis Mapping Tool
A tool that collects information from e-mails, text messages, blog posts, and Twitter tweets and maps them, making the information instantly publicly available.
Crisis-mapping tool
A tool that collects information from emails, text messages, blog posts, and twitter tweets and maps them, making the information instantly publicly available
TRUE
A trackpoint device is a small joystick-like nub that enables you to move the cursor with the tip of your finger.
Affective Computing
A type of computing that relates to emotion or deliberately tries to influence emotion.
Affective computing
A type of computing that relates to emotion or that deliberately tries to influence emotion
What doe the Bayh-Dole Act create?
A uniform policy for federal agencies relating to disposition of inventions conceived or reduced to practice under grants, contracts and cooperative agreements for experimental, developmental, or research work.
What do you need to read, send, and organize e-mail from any computer?
A web-based e-mail account
FALSE
A webcam is an example of an output device.
What is a Trademark
A word, name, symbol or device that is used in interstate trade with goods to indicate the source of the goods, their physical commodities, which may be natural,, manufactured or produced and to distinguish them from the goods of others.
tablet PC
A(n) ________ is similar to a notebook computer, but the monitor swivels and folds flat.
USB
A(n) __________ port enables printers and other peripherals to be connected directly to a laptop.
Which of the following is sealed in a protective case so that no dust gets inside? A. Hard drive B. NIC C. Blu-ray drive D. CD
A. Hard drive
Which of the following is the largest storage space? A. Internal hard drive B. Cache memory C. RAM D. CPU
A. Internal hard drive
Examples of crowdfunding and crowdsourcing include A. Kickstarter and ScanLife. B. Bing adn Google. C. Call a Bike and Zipcar. D. Ushahidi and Kiva.
A. Kickstarter and ScanLife.
Sophisticated modeling software is helping international researchers A. increase the pace of research in finding and producing vaccines. B. analyze computer systems to gather potential legal evidence. C. market new types of products to a wider audience. D. create more intricate screenplays and movie scripts.
A. increase the pace of research in finding and producing vaccines.
The BLANK performs all of a PC's arithmetic and logic operations.
ALU
Which of the following is not an Internet protocol
ARPANET
The agency that first began funding the Internet was called the ________.
Advanced Research Projects Agency Network
________ computing relates to emotion or deliberately tries to influence emotion.
Affective
People who do not read emotion easily in others hope for new progress in the field of
Affective Computing
What are Material Transfer Agreements?
Agreements to transfer research tools or data to and from researchers.
Which program can you use when you are taking notes in class?
All of the above: SoundNote, EverNote, and OneNote.
Halo Infant protection system
Allows hospitals to monitor the location of every newborn instantly
Fair Use Doctrine
Allows uses of copyrighted material that contribute to the creation of new work (I.e. a quote from copyrighted material), Fair uses do not require the permission of the copyright holder.
an entire file
An 8-bit binary digit can be interpreted by the computer as all of the following EXCEPT
license
An agreement by the owner of intellectual property to permit another to use a trademark, copyright, patent, or trade secret for certain limited purposes. A revocable right or privilege of a person to come on another person's land. - The party that owns the intellectual property rights and issues the license is the licensor, and the party obtaining the license is the licensee. - A license grants only the rights expressly described in the license agreement. A licensor might, for example, allow the licensee to use the trademark as part of its company name, or as part of its domain name, but not otherwise use the mark on any products or services. Disputes frequently arise over licensing agreements, particularly when the license involves Internet uses.
What is a point-of-attachment?
An author must have some connection with a Berne convention state to trigger protection
The type of computer that might help run your refrigerator or car is:
An embedded computer
FALSE
An embedded computer is an example of a mainframe computer.
What is not protected by copyright law?
Anything that is not in a tangible form, ideas or concepts, lists showing no originality, titles, names, short phrases, slogans, factual information, public domain information, works that contain no originality such as telephone lists, height and weight charts, tape measures and rulers or public domain information, and authored works not fixed in a tangible form.
The "Fair Use" Exception
An exception to liability for copyright infringement is made under the "fair use" doctrine. In certain circumstances, a person or organization can reproduce copyrighted material without paying royalties (fees paid to the copyright holder for the privilege of reproducing the copyrighted material). Section 107 of the Copyright Act provides as follows: T]he fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by [Section 106 of the Copyright Act], for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include— 1. the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; 2. the nature of the copyrighted work; 3. the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and 4. the effect of the use upon the potential market for or value of the copyrighted work.
To add additional ports to your computer, what do you need?
An expansion cord
allow legs to make contact with the sides of the chair
An ideal chair for the workplace does all of the following EXCEPT __________.
What is a patent issued for?
An invention that is "novel" and not known by others
Computer Forensics
Analyzing computer systems to gather potential legal evidence
Where do Patent & Copyright derive their authority?
Art. I Sec. 8 Cl. 8 of Constitution: To promote the progress of science and useful arts, by securing for a limited time to authors and inventors, the exclusive right to their respective writings and discoveries.
Crowdfunding
Asking for small donations from a large number of people, often using the internet; a style of generating capital to start a business through social media
What three things pushes people to apply their free time to projects, for no money?
Autonomy, Mastery, and Purpose
Being computer literate includes being able to
Avoid spam, adware and spyware, use the web effectively, diagnose and fix hardware and software problems
Computer Literate
Being familiar enough with computers that a user knows how to use them and understands their capabilities and limitations
Computer Literate
Being familiar enough with computers that you understand their capabilities and limitations and you know how to use them.
Which of the following is NOT a port that would be available on a sound card? A. Joystick controller B. Ethernet C. Microphone D. Line input
B. Ethernet
What cards are added to the computer to add certain functions, such as sound and video? A. Modem B. Expansion C. NIC D. Ethernet
B. Expansion
What card translates binary data into images on a monitor? A. NIC B. Video C. Sound D. CPU
B. Video
Bike-sharing programs like New York City's Citi Bike are an example of A. principled psychology. B. a subscription-style business model made possible by technology. C. crowdsourcing. D. crowdfunding.
B. a subscription-style business model made possible by technology.
Social media A. prevents two-way dialog between people. B. is incorporated as part of a political strategy by many politicians. C. cannot e immediate enough to react to quickly developing issues. D. is useful only for personal friendships.
B. is incorporated as part of a political strategy by any politicians.
E-commerce that involves businesses buying and selling goods and services to other businesses is called ________.
B2B
two digits
Binary numbers are based on a series of __________.
Which of the following is NOT a characteristic of a blog?
Blogs are private and require password access
What is the EU case on databases?
British Horseracing Board: basically, little protection for databases. ECJ says creating data (bringing into existence) not protected. No substantial investment. Whereas, gathering data, would be substantial investment. BHB loses! (CRAZY CASE!)
What is copyright?
Bundle of rights granted to authors, allowing them to control and prevent different uses by others
What is the difference b/t Civil and CL countries in regards to copyright?
Civil = natural rights based rationale CL = incentive based rationale
Where does Trademark derive it's authority?
Commerce Clause
PERIPHERAL DEVICE
Component that is connected to a computer
Analyzes computer systems to gather potential legal evidence
Computer forensics
Analyzing computer systems to gather legal evidence is known as the field of
Computer forensics
The MACH project shows that
Computers can help people with interpersonal skills development
Which of the following is an example of portable storage? A. Motherboard B. Internal hard disk C. Blu-ray disc D. CPU
C. Blu-ray disc
Where does the computer store instructions and data that are used most often by the CPU? A. Video RAM B. Hard drive C. Cache memory D. Read-only memory
C. Cache memory
A network interface card (NIC) gives you access to which type of port? A. HDMI B. USB C. Ethernet D. Firewire
C. Ethernet
Where are the instructions stored that the computer needs when it starts up? A. DVD drive B. Cache memory C. ROM D. RAM
C. ROM
Which of the following actions would NOT help to identify your personal ethics? A. describe yourself. B. identify the influences of your work environment C. conduct a genealogical study of your extended family. D. prepare a list of values that are most important to you.
C. conduct a genealogical study of your extended family.
Information technology is the study of A. stock prices and other financial data B. meteorological reports produced by supercomputer simulations. C. the processing and retrieval of information D. all of the above.
C. the processing and retrieval of information
Which of the following statements is FALSE? A. individuals who have no sense of right or wrong exhibit amoral behavior. B. ethical decisions are usually influenced by personal ethics. C. unethical behavior is always illegal. D. life experience affects an individual's personal ethics.
C. unethical behavior is always illegal.
eBay and Craigslist are examples of what kind of electronic commerce?
C2C
What are the policy difference on copyright b/t CL and Europe?
CL: instrumentalist, incentive for creativity EU: natural rights, fruits of your labor
the "brains of the computer
CPU
The Broad Range of Trademarks and Service Marks (((supplemental)))
Catchy Phrases—Certain brands have established phrases that are associated with them, such as Nike's "Just Do It!" As a marketing manager for a competing product, you will have to avoid such catchy phrases in your own marketing program. Note, though, that not all phrases can become part of a trademark or service mark. When a phrase is extremely common, the courts normally will not grant trademark or service mark protection to it. Abbreviations—The public sometimes abbreviates a well-known trademark. For example Budweiser beer is known as Bud and Coca-Cola as Coke. As a marketing manager, you should avoid using any name for a product or service that closely resembles a well-known abbreviation, such as Koke for a cola drink. Shapes—The shape of a brand name, a service mark, or a container can take on exclusivity if the shape clearly aids in product or service identification. For example, just about everyone throughout the world recognizes the shape of a Coca-Cola bottle. As a marketing manager, you would do well to avoid using a similar shape for a new carbonated drink. Ornamental Colors—Sometimes color combinations can become part of a service mark or trademark. For example, FedEx established its unique identity with the use of bright orange and purple. The courts have protected this color combination. The same holds for the black-and-copper color combination of Duracell batteries. Ornamental Designs—Symbols and designs associated with a particular mark are normally protected. Marketing managers should not attempt to copy them. Levi's places a small tag on the left side of the rear pocket of its jeans. Cross uses a cutoff black cone on the top of its pens. Sounds—Sounds can also be protected. For example, the familiar roar of the Metro-Goldwyn-Mayer (MGM) lion is protected.
What materials are covered in a Material Transer Agreement?
Cell lines, animal models such as knockout mice, cloning tools such as PCR, monocional antibodies, droug compounds, data, software and other materials useful in conducting research.
The ________ is used in combination with other keys to perform shortcuts and special tasks.
Control (Ctrl) key
What two WTO places do people go to settle disputes?
Council for TRIPS & Dispute Settlement Body
Counterfeit Goods
Counterfeit goods copy or otherwise imitate trademarked goods but are not genuine. - The importation of goods bearing counterfeit (fake) trademarks poses a growing problem for U.S. businesses, consumers, and law enforcement. - In addition to having negative financial effects on legitimate businesses, sales of certain counterfeit goods, such as pharmaceuticals and nutritional supplements, can present serious public health risks. - Although Congress has enacted statutes against counterfeit goods (discussed next), the United States cannot prosecute foreign counterfeiters because our national laws do not apply to them. - one effective tool that U.S. officials are using to combat online sales of counterfeit goods is to obtain a court order to close down the domain names of Web sites that sell such goods.
Computer technology is used in the arts by
Creating multimedia museum tours, creating web pages to advertise and sell art, integrating it into new works of performance art
The ________ lets information be created, distributed, and filtered by users themselves in real time.
DYTHR project
Which allows retailers to respond to consumer buying patterns?
Data Mining
Which of the following allows retailers to respond to consumer buying patterns
Data mining
INFORMATION
Data that has been organized in a meaningful fashion
A search engine that searches other search engines is called a SuperSearch engine.
False
Criminal investigators may find evidence on a computer, but the evidence cannot be used in court.
False
Data and information are interchangeable terms.
False
Each time you connect to the Internet, your computer is assigned the same IP address
False
Ergonomics is important only with desktop computers, not mobile devices.
False
Hacktivism is another word for cyberterrorism. True or False
False
Modern motivation theory says people work hardest when offered the highest pay. (T/F)
False
Which of the following is NOT a main component of the motherboard? A. CPU B. RAM C. Cache memory D. DVD
D. DVD
Intellectual property A. is the result of someone's creative work and design. B. can be protected legally by the patent system. C. can include works of music, film, or engineering design. D. all of the above.
D. all of the above
Being computer literate includes being able to A. avoid spam, adware, and spyware. B. use the web effectively. C. diagnose and fix hardware and software problems. D. all of the above.
D. all of the above.
Web 2.0 has led to a shift from just consuming content toward A. spending all our time on leisure activities. B. less sharing of the work we produce. C. new standards for HTML. D. producing content.
D. producing content.
The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.
DVI
What are moral rights?
Defend integrity and paternity of work
Secondary Meaning
Descriptive terms, geographic terms, and personal names are not inherently distinctive and do not receive protection under the law until they acquire a secondary meaning. - A secondary meaning arises when customers begin to associate a specific term or phrase, such as "London Fog," with specific trademarked items (coats with "London Fog" labels) made by a particular company. - Once a secondary meaning is attached to a term or name, a trademark is considered distinctive and is protected. Even a color can qualify for trademark protection, such as the color schemes used by state university sports teams, including Ohio State University and Louisiana State University.Footnote
What is the importance of an invention disclosure report?
Ensures compliance with the requirments of Bayh-Dole.
What kind of software is responsible for back office operations such as billing and inventory?
Enterprise resource planning
________ plug into slots on the motherboard and provide additional functionality for your computer.
Expansion cards
________ are a form of permanent storage that can be seen and accessed from outside the system unit and are typically used for CD and DVD drives.
External drive bays
Which is NOT an example of social networking?
four digits
Each __________ of binary can be represented with a single digit of hexadecimal.
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
Embedded
________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.
Ergonomics
A(n) BLANK port is needed for connecting a computer to a wired network.
Ethernet
Give eight examples of Fair Use
Examples of fair use include commentary, criticism, news reporting, research, teaching, library archiving and scholarship.
Cognitive surplus means that we now find many people with:
Excess time and free tools for collaboration
QR codes let companies track your past purchases and customize offers for you.
False
Speakers connect to the VGA port.
False
Supercomputers can accurately forecast tornadoes within minutes.
False
The Next Einstein Initiative uses the power of supercomputing to enhance mathematical education
False
The Next Einstein Initiative uses the power of supercomputing to enhance mathematical education. True or False
False
The Next Einstein Initiative uses the power of supercomputing to enhance mathematical education. (T or F)
False
The clock speed of the CPU is the only measure of a processor's expected performance.
False
True and false The Next Einstein Initiative uses the power of super computing to enhance mathematical education
False
Virtual reality is the addition of infographics to your visual field
False
Virtual reality is the addition of infographics to your visual field. (T or F)
False
When you buy software, you then own it and can do anything you'd like with it, including giving it to a friends to install on their machine
False
When you need help with software, you should use the program's help features or manufacturer FAQs, not online help like podcasts or YouTube videos.
False
LED and LCD monitors are considered Legacy Technology
False, they are still being used today!
Strong Marks
Fanciful, arbitrary, or suggestive trademarks are generally considered to be the most distinctive (strongest) trademarks. - Because they are normally taken from outside the context of the particular product, strong marks provide the best means of distinguishing one product from another.
The name of the free Internet browser from Mozilla is ________.
Firefox
permanent DVD drives
Fixed media bays can be used for __________.
What type of storage device can you use to transfer digital data between your computer and devices such as digital cameras?
Flash Memory Card
Next Einstein Initiative NEI
Focuses technological resources on talented young Africans
When does copyright protection begin?
From the time the authored work is created in a fixed tangible form and the work of authorship immediately becomes the property of the author who created the work.
________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.
Function keys
TRUE
Game controllers such as joysticks, game pads, and steering wheels are examples of input devices.
Computer forensics uses computer systems and technology to
Gather potential legal evidence
Crowdfunding helps start-up businesses by
Gathering financial contributions from supporters
What is the nationality of origin in Berne?
Generally where published.
What is a Utility Patent?
Granted to anyone who invents or discovers any new and useful process, machine, article of manufacture or compositions of matters, or any new useful improvement thereon.
You can connect a high-definition television to your computer using a(n) BLANK port.
HDMI
uncompressed digital data
HDMI (High-Definition Multimedia Interface) is a compact audio/video interface for transmitting __________.
What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser?
HTTP
________ is a power mode that allows the computer to save an image of the desktop to the hard drive and enter a state of reduced power consumption to save energy.
Hibernate
ergonomics.
How you arrange your computer and other equipment to minimize your risk of injury or discomfort is________.
Why did small countries sign on to TRIPS?
IP was tied to other trade issues
Patent Infringement
If a firm makes, uses, or sells another's patented design, product, or process without the patent owner's permission, it commits the tort of patent infringement. Patent infringement may occur even though the patent owner has not put the patented product in commerce. Patent infringement may also occur even though not all features or parts of an invention are copied. (To infringe the patent on a process, however, all steps or their equivalent must be copied.) Foreign firms can apply for and obtain U.S. patent protection on items that they sell within the United States, just as U.S. firms can obtain protection in foreign nations where they sell goods. a general rule, no patent infringement occurs under U.S. law when a patented product is made and sold in another country.
Remedies for Patent Infringement
If a patent is infringed, the patent holder may sue for relief in federal court. The patent holder can seek an injunction against the infringer and can also request damages for royalties and lost profits. In some cases, the court may grant the winning party reimbursement for attorneys' fees and costs. If the court determines that the infringement was willful, the court can triple the amount of damages awarded (treble damages). In 2006, however, the United States Supreme Court ruled that patent holders are not automatically entitled to a permanent injunction against future infringing activities. According to the Supreme Court, a patent holder must prove that it has suffered irreparable injury and that the public interest would not be disserved by a permanent injunction. This decision gives courts discretion to decide what is equitable in the circumstances and allows them to consider the public interest rather than just the interests of the parties. Actual damages are based on the harm caused to the copyright holder by the infringement, while statutory damages, not to exceed $150,000, are provided for under the Copyright Act.
How long does copyright protection last for an authored work?
If the authored work was originally created on or after January 1, 1978 the term os for the author's life plus 70 years after their death.
expansion cards
If you don't have all the built-in connectors you would like in a laptop, you can add __________.
FireWire
If you're editing digital videos, which kind of port works well for downloading video?
________ printers have tiny hammerlike keys that strike the paper through an inked ribbon.
Impact
The Anti-Counterfeiting Trade Agreement (ACTA) (2011)
In 2011, Australia, Canada, Japan, Korea, Morocco, New Zealand, Singapore, and the United States signed the Anti-Counterfeiting Trade Agreement (ACTA), an international treaty to combat global counterfeiting and piracy. The members of the European Union, Mexico, Switzerland, and other nations that support ACTA are still developing domestic procedures to comply with its provisions. Once a nation has adopted appropriate procedures, it can ratify the treaty. Goals: - to increase international cooperation, facilitate the best law enforcement practices, and provide a legal framework to combat counterfeiting. - ACTA applies not only to counterfeit physical goods, such as medications, but also to pirated copyrighted works being distributed via the Internet. The idea is to create a new standard of enforcement for intellectual property rights that goes beyond the TRIPS agreement and encourages international cooperation and information sharing among signatory countries. Border Searches" - Under ACTA, member nations are required to establish border measures that allow officials, on their own initiative, to search commercial shipments of imports and exports for counterfeit goods. The treaty neither requires nor prohibits random border searches of electronic devices, such as laptops, tablet devices, and smartphones, for infringing content. If border authorities reasonably believe that any goods in transit are counterfeit, the treaty allows them to keep the suspect goods unless the owner proves that the items are authentic and noninfringing. - The treaty allows member nations, in accordance with their own laws, to order online service providers to furnish information about (including the identity of) suspected trademark and copyright infringers.
What are Four Types of Intellectual Property?
Patent, Trademark, Copyright, Trade Secret
tendonitis
Incorrect placement of your keyboard can cause __________.
Collaborative consumption is when people get together to
Increase the use of a single product by sharing access to it
What is the requirement for originality in the US?
Independent Creation + Modicum of creativity (Feist)
A field of study focused on managing and processing information and the automatic retrieval of information is
Information Technology
IT is the abbreviation for
Information technology
________ is a field of study focused on information handling and retrieval of information automatically.
Information technology
Which is NOT an advantage of using software suite?
The programs integrate easily with programs from other software suites.
Section 102 Exclusions
It is not possible to copyright an idea. Section 102 of the Copyright Act specifically excludes copyright protection for any "idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied." What is copyrightable is the particular way in which an idea is expressed. Whenever an idea and an expression are inseparable, the expression cannot be copyrighted. Generally, anything that is not an original expression will not qualify for copyright protection. Facts widely known to the public are not copyrightable. Page numbers are not copyrightable because they follow a sequence known to everyone. Mathematical calculations are not copyrightable. for the design of a useful article to be copyrightable, the sculptural features of the article (the way it looks) must be separate from the article's utilitarian (functional) purpose.
Which is NOT true about the internet
It was developed as an additional means of commerce
Which case? courts can look to foreign law when dealing with ownership and domestic law when looking at infringement?
Itar-Tass Russian News Agency
Collaborative Consumption
Joining together as a group to use a specific product more efficiently
Examples of crowdfunding and crowdsourcing include
Kickstarter and MobileVoice
Examples of crowdfunding and crowd sourcing includes
Kickstarter, MobileVoice
What case says copyright infringement is transitory and allows US court jurisdiction?
London Films: UK corp. infringed by corp. in Chile. Us not Rome signatory, still enforces.
A small program that groups a series of commands so they will run as a single command is called a:
Macro
When and where do you register a copyright?
The registration is made to the Library of Congress in the Copyright Office. Registrations can be made at any time within the life of the copyright with the use of U.S. Government forms.
Software
The set of computer programs or instructions that tells the computer what to do and that enables it to preform different tasks
BRIGHTNESS
Measure of light showing when the monitor is displaying pure white
SCREEN RESOLUTION
Measured in the number of pixels on the screen.
Researchers believe that microchips may one day restore sight to the blind.
True
Image, video, and audio editing software belong in the category of what kind of software?
Multimedia Software
System Software include the operating system and utility programs.
True
Teachers can show students simulations online and use instructional software programs on the web
Museums and Technology now have virtual tours on websites also used to enhance visitors experiences at museums suchas New York's Museum of Art which has podcasts and multimedia tours to supplement experience while there.
Does TRIPS require moral rights?
NO.
Does EU database violate TRIPS?
No. B/c TRIPS doesn't address databases.
What enables your computer to connect with other computers?
Network Interface Card
Collateral Estoppel: Can a company successfully assert in the US based on an ECJ finding?
No
People form into groups based on what?
Not age or income, but common interests.
________ displays use organic compounds that produce light when exposed to an electric current.
OLED
The Internet is referred to as a client/server network.
True
Is the anti-bootlegging statute constitutional?
Only applies to music. Yes, under commerce clause.
Which is NOT a built-in-input device for a notebook?
Optical Mouse
What treaty deals with patent, trademark, and industrial property?
Paris (1883)
Penalties for Counterfeiting
Persons found guilty of violating the SCMGA may be fined up to $2 million or imprisoned for up to ten years (or more if they are repeat offenders). - If a court finds that the statute was violated, it must order the defendant to forfeit the counterfeit products (which are then destroyed), as well as any property used in the commission of the crime. - The defendant must also pay restitution to the trademark holder or victim in an amount equal to the victim's actual loss.
What case illustrates the national treatment principle and why?
Phil Collins: He sued in Germany, where someone was selling an illegal copy of a US concert. Only Germans had redress. Phil Collins appealed to the ECJ, who found Germany violated national treatment.
Which of the following is true about plug-ins?
Plug-ins are necessary for viewing most web graphics
What type of software enables you to create dynamic slide shows?
Presentation
New technologies pushing the boundaries of printing include ________.
all of these
E-commerce (or electronic commerce)
Process of conducting business online, such as through advertising and selling products
Web 2.0 has led to a shift from just consuming content toward
Producing content
What does PIPA stand for?
Protect Internet Protocol Act
Which is NOT a technology that has been used to deliver assistance during times of crisis?
QR codes
DVI port
Question 4. This port enables you to connect your computer to a flat-panel monitor.
The contents of BLANK memory are erased when the computer is turned off.
RAM
________ is the place in a computer where the programs and data the computer is currently using are stored.
RAM
stores information as long as the computer is on
RAM
________ tags, when placed on a car, can be used to record and track in a database all of the vehicle's movements.
RFID
Which holds the instructions the computer needs to start up?
ROM
________ is a form of permanent memory that holds all the instructions the computer needs to start up.
ROM
stores computer start up instructions
ROM
Podcasts use which of the following technologies?
RSS
wrist rest
To reduce wrist strain, use a __________.
RFID Radio Frequency Identification Tags
Ranchers use to manage and minimize disease outbreaks among cattle; RFID tags emit a wireless signal at all times across a network, which can communicate with other devices.
RSS stands for ________.
Really Simple Syndication
The decimal number is 1,000.
Referring to the demonstration in the Sound Byte, what happens when you dump the 102 bucket ten times?
Trademark Infringement (used without authorization)
Registration of a trademark with the U.S. Patent and Trademark Office gives notice on a nationwide basis that the trademark belongs exclusively to the registrant. - The registrant is also allowed to use the symbol ® to indicate that the mark has been registered. - Whenever someone else uses that trademark in its entirety or copies it to a substantial degree, intentionally or unintentionally, the trademark has been infringed (used without authorization). - When a trademark has been infringed, the owner has a cause of action against the infringer. - To succeed in a lawsuit for trademark infringement, the owner must show that the defendant's use of the mark created a likelihood of confusion about the origin of the defendant's goods or services. - The owner need not prove that the infringer acted intentionally or that the trademark was registered (although registration does provide proof of the date of inception of the trademark's use). - The remedy most commonly granted for trademark infringement is an injunction to prevent further infringement. Under the Lanham Act, a trademark owner who successfully proves infringement can recover actual damages, plus the profits that the infringer wrongfully received from the unauthorized use of the mark. A court can also order the destruction of any goods bearing the unauthorized trademark. In some situations, the trademark owner may also be able to recover attorneys' fees.
What is 37 CFR Part 401?
Regulation regarding "Rights to Inventions Made by Nonprofit Organizations and Small Business Firms"
The TRIPS Agreement (1994) (>100)
Representatives from more than 100 nations signed the TRIPS agreement in 1994. The agreement established, for the first time, standards for the international protection of intellectual property rights, including patents, trademarks, and copyrights for movies, computer programs, books, and music. The TRIPS agreement provides that each member country of the World Trade Organization must include in its domestic laws broad intellectual property rights and effective remedies (including civil and criminal penalties) for violations of those rights. Generally, the TRIPS agreement forbids member nations from discriminating against foreign owners of intellectual property rights (in the administration, regulation, or adjudication of such rights). In other words, a member nation cannot give its own nationals (citizens) favorable treatment without offering the same treatment to nationals of all other member countries.
Collaborative Consumption
Sharing products rather than owning them individually
When using the Internet for research, you:
Should evaluate sites for bias and relevance
The minimum set of recommended standards for a program is known as the
System Requirements
What treaty sets a minimum standard for all forms of Intellectual Property?
TRIPS
What treaty requires national treatment for IP issues?
TRIPS; art. 3
What treaty requires MFN treatment for Intellectual Property issues?
TRIPS; art. 4; in general, you can't treat one country better than another (even if they are non-WTO)
A ________ was the first devices with touch screen capabilities.
Tablet PC
Technology that has been used to deliver assistance during times of a crisis.
Social media, Ushahidi, e-mail
________ is the gathering together of groups of people using online tools to connect and exchange ideas.
Social networking
INKJET PRINTER
Sprays tiny drops of ink on the paper
Statutory Protection of Trademarks
Statutory protection of trademarks and related property is provided at the federal level by the Lanham Act of 1946.
What case illustrates why a company needs to seeks IP protection outside the US?
Subafilms:The law of the US does not apply abroad, to extraterritorial infringement.
Which is NOT part of a search engine?
Subject Directory
________ software is the set of programs that enables the computer's hardware devices and application software to work together.
System
QR (Quick Response) Codes
Technology that lets any piece of print in the real world host a live link to online information and video content
Name the key principles to discuss about international patent or copyright infringement
Territoriality; National Treatment; MFN; Choice of Law; Choice of Forum; Recognition of Foreign Judgments; Res Judicata/Collateral Estoppel
Being computer literate is an advantage in almost every type of career. (T/F)
True
What is the Bayh-Dole Act?
The Bayh-Dole statute (37 U.S.C. Part 401) marked a turning point in the ability to move technology from university research into commercial use and is credited by some as one of the factors that lead to a resurgence of the United States a a leader in technology.
U.S. Constitution, Article 1, Section 8, Clause 8 states?
The Congress shall have the power...to promote the progress of science and useful arts by securing for limited times to authors and inventors the exclusive rights to their respected writings and discovers."
When purchasing items over the Internet, be sure to check ________.
all of these
The ________ is a strategic plan to focus on the young, talented, mathematical minds of Africa.
The Next Einstein Initiative
Many modern museums offer WiFi networks and multimedia downloads to their patrons to enrich their experience
True
motherboard
The _______ is the main circuit board that contains the central electronic components of the computer.
Computer Forensics
The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high-tech crime.
Who owns copyrighted work?
The author or those to whom the author has assigned their ownership rights
Cognitive Surplus
The combination of leisure time and the tools needed to be creative
RAM
The contents of __________ are erased when the computer is turned off.
1
The digit to the far right in any base system always has a place value of __________.
Digital Divide
The discrepancy between those who have access to the opportunities and knowledge that computers and the internet offer and those who do not
copyright
The exclusive right of an author or originator of a literary or artistic production to publish, print, sell, or otherwise use that production for a statutory period of time. an intangible property right granted by federal statute to the author or originator of certain literary or artistic productions. The Copyright Act of 1976 governs copyrights. Works created after January 1, 1978, are automatically given statutory copyright protection for the life of the author plus 70 years. For copyrights owned by publishing companies, the copyright expires 95 years from the date of publication or 120 years from the date of creation, whichever is first. For works by more than one author, the copyright expires 70 years after the death of the last surviving author. Copyrights can be registered with the U.S. Copyright Office (www.copyright.gov) in Washington, D.C. A copyright owner no longer needs to place a © or Copr. or Copyright on the work, however, to have the work protected against infringement. Chances are that if somebody created it, somebody owns it. copyright owners are protected against the following: 1. Reproduction of the work. 2. Development of derivative works. 3. Distribution of the work. 4. Public display of the work.
Digital Divide
The gap between the levels of Internet access and the availability of technical tools in different regions of the world.
120 GB to 2 TB
The hard drive currently stores ______ amount of data.
trade dress
The image and overall appearance ("look and feel") of a product that is protected by trademark law. - a broad concept that can include all or part of the total image or overall impression created by a product or its packaging. - The distinctive decor, menu, and style of service of a particular restaurant may be regarded as the restaurant's trade dress. Similarly, trade dress can include the layout and appearance of a mail-order catalog, the use of a lighthouse as part of a golf hole, the fish shape of a cracker, or the G-shaped design of a Gucci watch. - trade dress is subject to the same protection as trademarks.
Who owns a patent?
The inventor - unless they have assigned their ownership rights or are required to assign their ownership rights to their employer or another third party.
parallel to the floor while you are typing.
The keyboard should be positioned so your forearms are ________.
binary
The language computers use to process data into information, consisting of only the values 0 and 1.
Which of the following is true about open source software?
The program can be changed and freely distributed.
South Korea
The most wired country in the world, where 80% of households have high-speed internet connections.
The crisis of a growing digital divide is being addressed by
The next Einstein project
CPU
The part of the computer used for arithmetic operations is the __________.
Crowdsourcing
The phenomenon of consumers checking in with the voice of the crowd before making purchases.
the printer
The power supply provides power for all of the following EXCEPT __________.
data mining
The process by which great amounts of data are analyzed and investigated. The objective is to spot significant patterns or trends within the data that would otherwise not be obvious.
purpose
The understanding that you are working for something larger than yourself.
Which is TRUE about mainframe computers?
They support hundreds of users simultaneously.
The World Wide Web was invented by ________.
Tim Berners-Lee at CERN
Ethernet
To connect your computer to a network, the __________ port would be used.
Mastering software animation tools, such as Autodesk 3ds Max, will enable you to create compelling new worlds and new characters.
True
Trade Secrets in Cyberspace
Today's computer technology undercuts a business firm's ability to protect its confidential information, including trade secrets. For instance, a dishonest employee could e-mail trade secrets in a company's computer to a competitor or a future employer. If e-mail is not an option, the employee might walk out with the information on a flash pen drive. A former employee's continued use of a Twitter account after leaving the company may be the grounds for a suit alleging misappropriation of trade secrets.
Trademark Registration
Trademarks may be registered with the state or with the federal government. - To register for protection under federal trademark law, a person must file an application with the U.S. Patent and Trademark Office in Washington, D.C. A mark can be registered: 1. if it is currently in commerce or 2. if the applicant intends to put the mark into commerce within six months. - In special circumstances, the six-month period can be extended by thirty months, giving the applicant a total of three years from the date of notice of trademark approval to make use of the mark and to file the required use statement. Registration is postponed until the mark is actually used. - During this waiting period, the applicant's trademark is protected against any third party who has neither used the mark previously nor filed an application for it. - Registration is renewable between the fifth and sixth years after the initial registration and every ten years thereafter (every twenty years for trademarks registered before 1990).
Does Berne cover sound recordings and performance rights?
Trick Question! Depends on the country's definition of copyright!
A Software suite is a group of programs bundled as a package.
True
A green shaded address bar on a Web site indicates that the Web site is secure.
True
A macro is a small program that groups a series of commands so that they run as a single command.
True
A universal chat client allows you to chat with users who are using a different IM service than you are.
True
________ is a social networking service that enables you to exchange short text messages with your friends or "followers."
What's the difference b/t how the US and Europe sees authorship?
US = sound recordings & performers are authors Europe = no to sound recordings & performers
What hypo dealt with enforcement of foreign judgments?
US pays photographer to shoot dresses in France. US company sued under French copyright law. US won't enforce b/c against public policy
Give examples of how copyright is functionally different in US and EU?
US: allows works for hire EU: allows moral rights (attribution & integrity)
Flash drives plug into a(n) ________.
USB port
What's the rule of the shorter term?
Under Berne, protection is the life of the author + 50 years unless the second country decides to make it longer.
State and Federal Law on Trade Secrets
Under Section 757 of the Restatement of Torts, those who disclose or use another's trade secret, without authorization, are liable to that other party if: 1. They discovered the secret by improper means, or 2. Their disclosure or use constitutes a breach of a duty owed to the other party.
What type of microphone is best for recording a single voice?
Unidirectional
The text version of a Web site's Internet address is called the ________.
Uniform Resource Locator (URL)
S-video
Which port is used to connect a laptop to a television?
________ ports are now the most common ports for connecting input and output devices to the computer.
Universal serial bus (USB)
Spam
Unwanted junk e-mail.
Spam
Unwanted or junk email
a TV
Upgraded sound cards enable you to connect all of the following devices to your computer EXCEPT __________.
High Low Tech
Use inexpensive low tech parts to imitate the utility of expensive high tech tools
Artists interface with technology often, but cannot yet
Use software to suggest plot endings
U.S. patent law specifies that the subject matter must be?
Useful
LASER PRINTER
Uses heat to fuse the toner to the page
A crisis mapping tool such as ________ can collect information to make instantly and publicly available for use in emergencies.
Ushahidi
Which of the following is true about crisis-mapping software?
Ushahidi was created in a few days and distributed globally for free.
Which technologies have been used during times of crisis?
Ushahidi, SwiftRiver, Email, NOT QR codes
a NIC
Using __________ is one way to connect your computer with other computers.
crowdfunding
Using the Internet to get small donations from many people to start a business is called
Laser printers
Which printers are usually used in offices and classrooms because they print faster and produce high-quality printouts?
All of the above statements are true.
Which statement about video cards in NOT true?
All ports look the same.
Which statement is NOT true of a port?
Bluetooth range is about 30 feet.
Which statement is TRUE regarding Bluetooth?
Everything a computer does is broken down into a series of 0s and 1s.
Which statement is true about binary language?
The keyboard and the mouse
Which two objects should be at about the same height?
RAM
Which type of memory is considered volatile?
What organization administers TRIPS?
WTO
What treaties are relevant to copyright?
WTO members (TRIPS & Berne) Rome Convention (US not part of)
www.uspto.gov
Web site of the U.S. Patent and Trademark Office - provides searchable databases covering U.S. patents granted since 1976.
What is another name for Software as a Service (SaaS)?
Web-based application
Software that is available on-demand via the Internet is called:
Web-based software
Quick Response
What does QR stand for?
ROM
What holds all the instructions the computer needs to start up when it is powered on?
Sleep mode saves everything to memory, whereas Hibernate stores your data on your hard drive and your computer is powered off
What is the difference between Sleep mode and Hibernate in Windows 7?
Stores instructions the computer needs to start up
What is the purpose of ROM?
RJ-45
What is the technical name for the Ethernet port?
256
What is the value of the third column from the right in base 16?
Blink your eyes frequently
What steps should you take to prevent eye strain while staring at the monitor?
All data
What types of data are stored in computers as binary numbers?
Modem port
Which type of port looks like a normal phone jack?
clipboard
When a tablet PC has the monitor folded over the keyboard, it is said to be in __________ mode.
FALSE
When purchasing a printer, the cost of the printer is the only cost factor you need to consider.
0 to 255
When referring to RGB, each of the three colors can have values ranging from __________.
The color is black.
When referring to the colors displayed on a computer monitor, what results when the Red, Green, and Blue values are all set to 0?
When is copyright protection secured?
When the work is created in a tangible form. If a work is prepared oveer a period of time, the part of the work that is fixed on a particular date constitutes the created work as of that date.
FireWire card
Which of the following expansion cards does NOT provide some form of Internet connectivity for a notebook computer?
The keyboard should be placed on a shelf above the desktop.
Which of the following is NOT a healthy computing habit?
Placing the monitor off-center
Which of the following is NOT a preventative measure for computer vision syndrome?
Spots floating in front of your eyes
Which of the following is NOT a symptom of eye strain?
Pencil
Which of the following is NOT a tablet PC component?
Parallel
Which of the following is NOT a typical laptop port?
Solid-state drive
Which of the following is NOT another name for a flash drive?
Usually do not come with the computer
Which of the following is NOT true about expansion cards?
Most new laptops include a fixed floppy drive.
Which of the following is NOT true?
Terabyte
Which of the following terms represents one trillion bytes of data?
aspect ratio
Width-to-height proportion of a monitor is its ________.
Who uses social networking the most?
Women, so marketers will be increasingly driven by female perspective and by a more complex model of what groups are attracted to. No more cliches
What is "work made for hire"?
Work prepared by an employee within the scope of his or her employment.
What Is Protected Expression?
Works that are copyrightable include books, records, films, artworks, architectural plans, menus, music videos, product packaging, and computer software. To be protected, a work must be "fixed in a durable medium" from which it can be perceived, reproduced, or communicated. Protection is automatic. Registration is not required. Section 102 of the Copyright Act explicitly states that it protects original works that fall into one of the following categories: 1. Literary works (including newspaper and magazine articles, computer and training manuals, catalogues, brochures, and print advertisements). 2. Musical works and accompanying words (including advertising jingles). 3. Dramatic works and accompanying music. 4. Pantomimes and choreographic works (including ballets and other forms of dance). 5. Pictorial, graphic, and sculptural works (including cartoons, maps, posters, statues, and even stuffed animals). 6. Motion pictures and other audiovisual works (including multimedia works). 7. Sound recordings. 8. Architectural works.
Augmented Reality
a combination of our normal sense of the objects around us with an overlay of info displayed
Law - Contract
a company can protect what they consider to be a trade secret.
Once a point-of-attachment exists in a Berne country, does US automatically recognize it?
YES!
Can corporations be authors under Berne?
Yes
Are computer programs protected under copyright?
Yes, TRIPS says they are protectable under Berne.
Is there a way an author can get Berne protection without their country signing it?
Yes."Backdoor to Berne." Protection if you habitually reside or publish in a Berne country within 30 days.
DVDs
_______ can store approximately 14 times more data than a CD.
The Khan Academy is
a free technology tool used for education.
What does Web 2.0 describe?
a trend of new Web applications that combine the functionality of multiple applications
Bluetooth
a type of wireless communication
QR codes can be linked to
a video, a Facebook page, a website.
Restarting a computer when it is already powered on is called ________.
a warm boot
Faculty at universities often use course management software such as ________ to make information available to students. a. Blackboard b. Blueboard c. Noodle d. Whiteboard
a. Blackboard
The process of searching huge amounts of data with the hope of finding a pattern is called ________. a. data mining b. data searching c. data warehousing d. data retrieval
a. data mining
Unwanted or junk e-mail is called ________. a. spam b. spyware c. adware d. software
a. spam
people who dont read emotion easily in others hope for new progress in the field of
affective computing
Most Favored Nations
all WTO countries get same treatment as other countries
Computer technology is used in the arts by
all of the above -creating web pages to advertise and sell art -creating multimedia museum tours -integrating it into new works of performance art
Being computer literate includes being able to
all of the above -diagnose/fix hardware/software issues -use the web effectively -avoid spam, adware, and spyware
Data mining is
all of the above -important now because it is so easy to gather enormous data sets - the study of data using algorithms to detect patterns -the translation of Big Data sets into meaningful information
Social media has been used to
all of the above -replace TV and radio ads in political elections -increase voter turnout -increase communication between elected officials and their constituents
Boolean operators include such words as ________.
all of these
The Berne Convention (1989) (163)
an international copyright agreement, if a U.S. citizen writes a book, every country that has signed the convention must recognize her or his copyright in the book. Also, if a citizen of a country that has not signed the convention first publishes a book in one of the 163 countries that have signed, all other countries that have signed the convention must recognize that author's copyright. Copyright notice is not needed to gain protection under the Berne Convention for works published after March 1, 1989.
How to be computer savvy
avoid hackers protect privacy understand real risks use web wisely avoid online annoyances (spam)be able to maintain, upgrade, and troubleshoot computer
Being computer literate includes being able to
avoid spam, adware, and spyware. use the web effectively. diagnose and fix hardware and software problems.
The Madrid Protocol (2003) (86)
an international treaty that has been signed by 86 countries. Under its provisions, a U.S. company wishing to register its trademark abroad can submit a single application and designate other member countries in which the company would like to register its mark. The treaty was designed to reduce the costs of international trademark protection by more than 60 percent. Although the Madrid Protocol may simplify and reduce the cost of trademark registration in foreign countries, it remains to be seen whether it will provide significant benefits to trademark owners. Even with an easier registration process, there are still questions as to whether all member countries will enforce the law and protect the mark.
Computer forensics
analyzes computer systems to gather potential legal evidence
Computer forensics
analyzes computer systems to gather potential legal evidence.
Computer Forensics
analyzes computer systems with specific techniques to gather potential legal evidence
computer forensics*
analyzes computer systems with specific techniques to gather potential legal evidence. When have a suspect can search computer history and searches etc
Which of the following is NOT one of the four major data processing functions of a computer?
analyzing the data or information
What can be Patented?
any invention of a "new and useful process, machine, manufacture or composition of matter or any new and useful improvement thereof, 34 U.S.C. 101
QR Codes (Quick Response Codes)*
any piece of print in the real world can host a live link to online info and video content. They can be on fliers, advertisements, signs etc. Use app on smartphone to scan the code
Who can be inventors?
anyone who contributes to the "conception" or the "reduction to practice" of an invention. A student, technician, employee in any capacity, or a junior or senior faculty.
Compilations of Facts
are copyrightable Under Section 103 of the Copyright Act, a compilation is a work formed by the collection and assembling of preexisting materials or of data that are selected, coordinated, or arranged in such a way that the resulting work as a whole constitutes an original work of authorship. The key requirement for the copyrightability of a compilation is originality. The White Pages of a telephone directory do not qualify for copyright protection because they simply list alphabetically names and telephone numbers. The Yellow Pages of a directory can be copyrightable, provided that the information is selected, coordinated, or arranged in an original way.
Webcasts differ from podcasts in that webcasts ________.
are not updated automatically
Generic Terms
are terms that refer to an entire class of products, such as bicycle and computer. - receive no protection, even if they acquire secondary meanings. - For instance, aspirin and thermos were originally trademarked products, but today the words are used generically. - Other trademarks that have acquired generic use include escalator, trampoline, raisin bran, dry ice, lanolin, linoleum, nylon, and cornflakes.
The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________.
autism
Which of the following is an example of data mining? a. An Excel spreadsheet listing all employees and their annual salaries in a random order. b. Amazon providing you with a list of books you might enjoy. c. Raw data from questionnaires given at the mall. d. A printout of all sales taken from the register at the end of the day.
b. Amazon providing you with a list of books you might enjoy
The crisis-mapping tool ________ can collect information to make instantly and publicly available for use in emergencies. a. Marahabaa b. Ushahidi c. data mining d. The Witness Project
b. Ushahidi
Analyzing computer systems to gather potential legal evidence is ________.
b. computer forensics
Analyzing computer systems to gather potential legal evidence is ________. a. computer detectives b. computer forensics c. forensics detectives d. computer enforcement
b. computer forensics
People who are ________ make the Internet a powerful research tool and know how to find the information that they want effectively. a. computer productive b. computer literate c. technologically informed d. computer efficient
b. computer literate
Using the Internet to get small donations from many people to start a business is called ________. a. kickstarting b. crowdfunding c. crowdsourcing d. collaborating
b. crowdfunding
When being used as a portable device, the components inside a laptop computer derive their power from the BLANK inside the computer.
battery
Which of the following is NOT necessarily part of being computer literate?
being able to build a computer
Computer Literate*
being familiar enough with computers that you understand their capabilities and limitations and know how to use them efficiently
One potential application of ________ is to provide sight to the blind.
biomedical chip implants
Technology and Medicine
biomedical chip implants could give sight to the blind VeriMed is a personal ID chip size of rice and implanted under skin; contains name address and medical conditions of person whom the chip was implanted in Mu-chip as well Science and Technology Tornado forecasting more accurate can study ruins without being onsite
The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind.
biomedical chip research
Which is NOT a technology that has been used to deliver assistance during times of crisis?
blend.io
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.
breadcrumb trail
Suggestive Trademarks
bring to mind something about a product without describing the product directly. - example (1): "Dairy Queen" suggests an association between its products and milk, but it does not directly describe ice cream. - example (2): "Blu-ray" is a suggestive mark that is associated with the high-quality, high-definition video contained on a particular optical data storage disc. Although blue-violet lasers are used to read blu-ray discs, the term blu-ray does not directly describe the disc.
Podcasts enable you to ________.
broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________. a. paralysis b. diabetes c. autism d. drain damage
c. autism
The goal of ________ is to provide technological solutions to physical problems, such as providing sight to the blind. a. 3D animations b. computer forensics c. biomedical chip research d. RFID technology
c. biomedical chip research
Being ________ means being familiar enough with computers that you understand their capabilities and limitations. a. computer savvy b. technology literate c. computer literate d. computer competent
c. computer literate
The ESP system targeted at helping with autism stands for ________. a. extra sensory perception b. emotional-stabilizing program c. emotional-social prosthesis d. emotional-social program
c. emotional-social prosthesis
The Witness Project uses the power of video and a grassroots movement to advocate for ________. a. computer literacy b. social networking c. human rights d. responsible citizenship
c. human rights
Autonomy is defined as ________. a. working for something larger. b. feeling confident and excited about learning new skills. c. working without continual direction and control. d. repressing motivated behavior.
c. working without continual direction and control.
stores instructions and data used most often
cache
The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems.
certain Microsoft operating systems and Office software
Crowdsourcing
checking in with the voice of the crowd
Crowdsourcing*
checking in with the voice of the crowd. Example) MobileVoice to see people's verdict on quality of an item. Some companies are using them to improve their business and be proactive.
Joining together as a group to use a specific product more efficiently is called ________.
collaborative consumption
Crisis Mapping Tool*
collects info from e-mails, texts, blogs, tweets, and maps them making the info instantly publicly available. (example) Ushahidi
Augmented Reality
combination of normal sense of objects around us with an overlay of info displayed
What redress to companies have that reasonably relied?
compulsory license, or have one year to sellinfringing work
Analyzing computer systems to gather legal evidence is known as the field of
computer forensics
Analyzing computer systems to gather legal evidence is known as the field of
computer forensics.
People who are ________ make the Internet a powerful tool and know how to find the information that they want effectively.
computer literate
As engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human
computer systems
The MACH project shows that
computers can help people with interpersonal skills development
The MACH project shows that
computers can help people with interpersonal skills development.
Affective Computing
computing that relates to emotion or deliberately tries to influence emotion
Affective Computing
computing that relates to emotion or deliberately tries to influence emotion. the wide gap in computers' ability to do calculations versus their emotional abilities is the target of research
Social Networking
gathering together of groups of people using online tools to connect and exchange ideas
Which of the following software can best be used to help create digital art? a. Microsoft Excel b. Microsoft Word c. Adobe Acrobat d. Adobe Illustrator
d. Adobe Illustrator
________ is a field of study focused on information handling and retrieval of information automatically. a. Computer forensics b. Database mining c. RFID d. Information technology
d. Information technology
________ is a wearable device that hangs around your neck and consists of a camera, a projector, and a mirror that can communicate with the Internet over wireless Bluetooth technology. a. FastSCAN b. Data mining c. Emotional-social prosthesis (ESP) d. SixthSense
d. SixthSense
Joining together as a group to use a specific product more efficiently is called ________. a. affective computing b. social networking c. creative surplus d. collaborative consumption
d. collaborative consumption
The process of searching huge amounts of data with the hope of finding a pattern is called ________.
data mining
Which of the following allows retailers to respond to consumer buying patterns?
data mining
what allows retailers to respond to consumer buying patterns?
data mining
Being computer literate includes being able to
diagnose and fix hardware and software problems. avoid spam, adware, and spyware. use the web effectively.
Digital Divide*
difference in ease of access to technology. prevents us from using all of the minds on the planet to solve the planet's problems.
Being computer savvy means you ________.
do all of these
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of ________.
eight bits
Offshored
employement sent to other countries
Technology in Law Enforcement
facial recognition from skull search databases computer based trainingcomputer forensics
A virus is electronic junk mail.
false
Affective computing is a field of study focused on managing and processing information and the automatic retrieval of information.
false
Application software helps run the computer and coordinates instructions.
false
Autonomy is the feeling of confidence and excitement for seeing your own skills progress.
false
Autonomy is the feeling of confidence and excitement from seeing your own skills progress. true or false
false
Brightness determines how lighter colors appear on the display.
false
Computer literacy means that you are an expert on computer repair
false
Crowdfunding is asking for large donations from a few people.
false
Data and information are terms that can be used interchangeably.
false
Data mining is the set of techniques used in information handling and retrieval.
false
Digital cameras, camcorders, and webcams are common devices for capturing pictures and video and are all considered output devices.
false
E-mails are completely private.
false
Educators do not need to be computer literate.
false
Educators do not need to be computer literate. false or true
false
Educators do not need to be computer literate. true or false
false
Hardware refers to the programs that give commands to the computer.
false
Hospitals use nonimplant versions of identity chips on the wristbands of all patients.
false
If you are a design student, there is no reason for you to know how to use a computer.
false
If you are a design student, there is no reason for you to know how to use a computer. true or false
false
In a database, a table can be defined as a data category.
false
Instant messaging is available only from AOL.
false
Mainframes are used in situations where complex models requiring mathematical calculations are needed
false
Mastery is the simple understanding that you are working for something larger than yourself.
false
Mastery is the simple understanding that you are working for something larger than yourself. true or false
false
Media management programs are entertainment applications that turn artificial environments into a realistic experience.
false
Mastery
feeling confident and excited about learning new skills
Mastery*
feeling of confidence and excitement from seeing your own skills progress
Information technology (IT)
field of study focused on handling and automatic retrieval of information.
Information Technology*
field of study focused on managing and processing info and the automatic retrieval of info. includes computers, telecommunications, and software deployment
Information Technology (IT)
field of study focused on managing and processing information and the automatic retrieval of information.
computer forensics uses computer systems and technology to
gather potential legal evidence
Autonomy
freedom to work without constant direction and control
Autonomy*
freedom to work without constant direction and control
Crowdfunding helps start-up businesses by
gathering financial contributions from supporters
A ________ is approximately 1 billion bytes.
gigabyte
What is a Design Patent?
granted to anyone who invents a new, original, and ornamental design for an article of manufacture.
What is a Plant Patent?
granted to anyone who invents or discovers and asexually reproduces any distinct and new variety of plants.
Witness Protection
hopes to stop human rights abuses throughout the world
The Witness Project uses the power of video and a grassroots movement to advocate for ________.
human rights
All of the following are parts of a URL EXCEPT:
hyperlinks
Ergonomics
is the science of fitting the workspace to the worker.
The Lanham Act of 1946 (15 U.S.C. Sections 1051-1128.)
is to reduce the likelihood that consumers will be confused by similar marks. !!! was enacted in part to protect manufacturers from losing business to rival companies that used confusingly similar trademarks. - incorporates the common law of trademarks and provides remedies for owners of trademarks who wish to enforce their claims in federal court. - Many states also have trademark statutes. - In 1995, Congress amended the Lanham Act by passing the Federal Trademark Dilution Act
certification mark
is used by one or more persons, other than the owner, to certify the region, materials, mode of manufacture, quality, or other characteristic of specific goods or services - protected by law - Certification marks include such marks as "Good Housekeeping Seal of Approval" and "UL Tested."
Collaborative Consumerism
joining together as a group to use a product more efficiently
Collaborative Consumption*
joining together as a group to use a specific product more efficiently. redistribute things we have purchased, share our lives, share services a product provides instead of owning it outright
Spam
junk mail
Territoriality
laws only apply within borders; can be changed by international agreement (ex. Berne)
The term ________ describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular.
legacy technology
An original work of authorship protected by the U.S. copyright law could include?
literary works musical works including any accompanying words dramatic works including any accompanying music pantomimes and choreographic works pictorial graphic and sculptural work motion pictures and other audiovisual works sound records architectural works
Large, expensive computers that support hundreds of users simultaneously are called ________.
mainframes
Expansion cards fit into slots on the
motherboard
A ________ is approximately 1 million bytes.
megabyte
The ________ contains the central electronic components of the computer.
motherboard
One proposed answer to close the digital divide is to promote ________ as a means for low-income families to access the Internet.
mobile devices
USB ports are fast replacing traditional ________ ports because of their ability to transfer data quickly.
parallel and serial
National Treatment
people from other countries get no worse treatment than nationals; countries in TRIPS can treat nationals no less favorably (regardless of reciprocity)
Devices such as monitors and printers that are connected to the computer are called ________.
peripheral devices
Social Networking tools
played a part in revolutions in 2011
A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
port
The ________, housed inside the system unit, transforms the wall voltage to the voltages required by the computer chips.
power supply
Data Mining
process of searching huge amounts of data to find a pattern
Data Mining*
process of searching huge amounts of data with the hope of finding a pattern. For inventory control and to be able to respond to consumer buying patterns
Web 2.0 has led to a shift from just consuming content toward
producing content.
What is the stated purpose of the Bayh-Dole act?
promotion of "the utilization of inventions" from federally sponsored research, increasing collaboration between industry and universities, ensuring that federally funded inventions "are used in a manner to promote free competition and enterprise" without unduly encumbering future research and ensuring protection of "the public against nonuse or unreasonable use of inventions."
Law - Copyright
protects the expression gives the copyright holder the following exclusive rights, with some exceptions: To make copies of the work, To produce derivative works: Translations into other languages, Movies based upon the book, To distribute copies, To perform the work in public:
n the URL http://www.prenhall.com, the portion labeled http is the ________.
protocol
A technology named ________ lets any piece of print in the real world host a live link to online information and video content.
quick response codes
Next Einstein Initiative
rallying the support of the world to identify mathematical genius
Cognitive Surplus
results when leisure time and tools allow us to engage in creative acts
social networking tools played a part in what?
revolutions in 2011
A set of programs that searches the Web to find information is called a ________.
search engine
The First Sale Doctrine
section 109(a) of the Copyright Act—also known as the first sale doctrine—provides that "the owner of a particular copy or phonorecord lawfully made under [the Copyright Act], or any person authorized by such owner, is entitled, without the authority of the copyright owner, to sell or otherwise dispose of the possession of that copy or phonorecord." In other words, once a copyright owner sells or gives away a particular copy of a work, the copyright owner no longer has the right to control the distribution of that copy!!!! example: Miranda buys a copyrighted book, such as The Hunger Games by Suzanne Collins. She can legally sell it to another person.
The "s" in https stands for ________.
secure socket layer
Offshored*
sent to other countries. many types of programming jobs have suffered this, but not video game development
By studying the data produced by ________, scientists hope to improve the prediction of weather phenomena.
simulations
The gathering together of groups of people using online tools to connect and exchange ideas is
social networking
What provides a level of instant connection and instant distribution of information that is reshaping the world
social networking tools
Crowdsourcing
solicits online input from consumers
What is an Invention?
something that is new, did not exist before, and is not known to others who have the same ordinary skill in the art to which the invention pertains and is created by independent investigation and experiment.
What does the Rome Convention cover?
sound recordings & broadcasts
Unwanted e-mail is called ________.
spam
Computer forensics analyzes computer systems in gathering potential legal evidence.
true
Education and Technology
students and teachers must have working knowledge of computers now.
What is the EU database protection?
sui generis / protects sweat of the brow
Computer forensics analyzes computer systems in gathering potential legal evidence. true or false
true
The Web is based on the Hypertext Transmit Protocol.
t/f
A(n) ________ is a keyword or term that is assigned to a piece of information such as a Web page, digital image, or video and describes the site so that it can be found again by browsing or searching.
tag
Emotional - Social prosthesis (ESP) device
targeted at helping people who have autism.
AIMS
teaching young minds in Africa so we can use their smarts. African Institute for Mathematical Sciences. Trying to close the digital divide
Quick Response (QR) Codes
technology that lets any piece of print in real world host a live link to online information and video content
if criminal investigators using computer forensics find evidence
the evidence CAN be used in court
All of the following are examples of multimedia EXCEPT:
text
What does the 37 CFR Part 401 Act provide?
that a college or university may retain the patent rights to an invention that is conceived or first reduced to practice in the performace of a federally funded contract, grant or cooperative agreement, with provisions..
Simulation software that can be used in education includes
the Interactive Body.
Children who do not have access to ________ and ________ won't be prepared for future employment.
the Internet, computers
The crisis of growing digital divide is being addressed by what?
the Next Einstein project
Creative Surplus
the ability of the world's populace to volunteer and collaborate on large projects
Creative Surplus*
the ability of the world's populace to volunteer and collaborate on large projects.
A webcast is ________.
the broadcast of audio or video content over the Internet
The digital divide contributes to
the cycle of poverty
Digital Divide
the difference in ease of access to technology
Mastery
the feeling of confidence and excitement from seeing your own skills progress
Data Mining
the process by which great amounts of data are analyzed and investigated. The objective is to spot significant patterns or trends within the data that would otherwise not be obvious
When granting exclusive license rights it is important to retain?
the right to use the invention or the copyrighted work in future research and educational programs and with other - non-profit organizations.
What is a service mark?
the same as a trademark except it identifies and distinguishes the source of a service other than that of a product that is performed by one person for the benefit of a person or persons other than himself, either for pay or otherwise.
Information Technology (IT)
the set of techniques used in processing and retrieving information
Define "useful" in terms of patents
the subject matter of a patent application has to have a useful purpose and must also demonstrate how the subject matter operates.
Purpose
the understanding that you are working for something larger than yourself
Purpose*
the understanding that you are working for something larger than yourself
Video Games
they are best developed for a local market by people native to that market so it won't be offshored
The Internet2 is a project ________.
to develop new Internet technologies
Define NIH'S "unique research resources"
to embrace the full range of tools that scientists use in the laboratory -
America Invents Act (2011)
to prove who invented an item first - the first person to file an application for a patent on a product or process will receive patent protection. - The period of patent protection begins on the date when the patent application is filed, rather than when the patent is issued, which can sometimes be years later. - After the patent period ends (either 14 or 20 years later), the product or process enters the public domain, and anyone can make, sell, or use the invention without paying the patent holder.
Trademark Dilution Revision Act (TDRA)
to state a claim for trademark dilution, a plaintiff must prove the following: 1. The plaintiff owns a famous mark that is distinctive. 2. The defendant has begun using a mark in commerce that allegedly is diluting the famous mark. 3. The similarity between the defendant's mark and the famous mark gives rise to an association between the marks. 4. The association is likely to impair the distinctiveness of the famous mark or harm its reputation. - protect "distinctive" or "famous" trademarks (such as Rolls Royce, McDonald's, and Apple) from certain unauthorized uses even when the use is on noncompeting goods or is unlikely to confuse. - More than half of the states have also enacted trademark dilution laws. - A famous mark may be diluted not only by the use of an identical mark but also by the use of a similar mark.
Crisis Mapping Tool
tool that collects information from emails, texts, blogs, tweets and maps them, making the info instantly available to the public
In the URL http://www.prenhall.com, the portion labeled .com is the ________.
top-level domain
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.
touch pad
Micro-expressions
training tool software system can train users to recognize emotions
A University of Michigan study shows that without Internet access at home, teens from low income households are more likely to use their cell phones to go online than their wealthier counterparts.
true
A new feature in Excel 2010 that fits a small chart into a single cell is called sparklines.
true
A smartphone is a computer.
true
A subject directory is an outline of Web sites organized by topic.
true
A tag can be assigned to a Web page, a digital image, or a video.
true
A universal chat client allows you to chat with users who are using a different IM service than you are.
true
A wizard is a systemic guide that walks you through the steps necessary to complete a complicated task.
true
Adobe Illustrator is a drawing software application that enables you to create professional-quality creative and technical illustrations.
true
Adobe Illustrator is a type of drawing software.
true
Affective computing is a field of study that attempts to produce machines that understand and can respond to human emotions.
true
Affective computing is a science that attempts to produce machines that understand and can respond to human emotion.
true
All popular social networking sites have privacy policies but you still need to follow certain precautions when using their sites.
true
Although Apple created the Safari browser, there is a Windows-based version available.
true
Any flat surface can become an input device using SixSense.
true
Any surface can become an input device using SixthSense.
true
Apple's Final Cut Pro is an example of software that enables you to edit video.
true
At the Wake Forest Institute for Regenerative Medicine, researchers use a desktop printer to create human organs?
true
Becoming computer literate means knowing which technologies are on the horizon and how to integrate them with your home setup.
true
Being computer literate means being able to separate the real privacy and security risks from things that you don't have to worry about.
true
Biomedical chip implants are being used to provide sight to the blind.
true
Bits and bytes are used to represent the quantity of data and information the computer inputs and outputs.
true
Cognitive surplus is the combination of leisure time and creativity tools.
true
Wizards are step-by-step guides for performing complicated tasks in application software.
ture
Economic Espionage Act
which made the theft of trade secrets a federal crime.
One way to mark a Web site so that you can return to it later without typing the address is to ________.
use Favorites or Bookmarks
Arbitrary trademarks
use common words that would not ordinarily be associated with the product, such as Dutch Boy as a name for paint.
artists interface with technology often but cannot yet
use software to suggest plot endings
Swap.com
usees power of peer to peer connections to find best set of matches for people to trade things.
Witness Project
uses cameras and video to "See it. Film It. Change It."
A(n) BLANK card often has its own RAM and processor to speed up graphics processing.
video
SixthSense
wearable device hanging around your neck that has a camera a projector and a mirror that communicates with the internet over bluetooth through the cell phone in your pocket. It AUGMENTS REALITY by giving you info as you need it.
collaborative consumption is
when people get together to increase the use of a single product by sharing access to it
Federal Trademark Dilution Act
which allowed trademark owners to bring a suit in federal court for trademark dilution. - In 2006, Congress further amended the law on trademark dilution by passing the Trademark Dilution Revision Act (TDRA)
the Computer Software Copyright Act (1980_
which amended the Copyright Act to include computer programs in the list of creative works protected by federal copyright law. Generally, copyright protection extends to those parts of a computer program that can be read by humans, such as the "high-level" language of a source code. Protection also extends to the binary-language object code, which is readable only by the computer, and to such elements as the overall structure, sequence, and organization of a program. Not all aspects of software are protected, however. Courts typically have not extended copyright protection to the "look and feel"—the general appearance, command structure, video images, menus, windows, and other screen displays—of computer programs.
Uniform Trade Secrets Act
which has been adopted in forty-seven states.