Bus Law 2 - Chapter 12 Intellectual Property and Cyberlaw

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The U.S. Patent and Trade Office is an agency of the Department of ______.

(a. Commerce) b. Justice c. Interior d. Treasury

Which of the following marks are generally NOT protected under the Lanham Act?

(a. Descriptive) b. Suggestive c. Arbitrary d. Generic

What type of patent provides protection to the appearance of a product?

(a. Design) b. Utility c. Plant d. Provisional

How long can trade secret protection last?

(a. Forever) b. Five years c. Twenty years d. Thirty years

______ is unauthorized access from a computer.

(a. Hacking) b. Cracking c. Cybersquatting d. Cyberbullying

Remedies for misappropriation of trade secrets can include which of the following?

(a. Injunctive relief to prevent disclosure of the secret) b. Treble damages for bad faith c. Attorney's fees if the misappropriation was negligent d. Punitive damages

Which of the following is NOT a reason that patent lawsuits are difficult?

(a. Lack of patent case law) b. Proving patent infringement c. Acquiring expert witnesses d. Legal counsel time to defend complex issues of infringement

Kamila was recently granted a patent for her new golf club. What document did the Patent Office provide to Kamila?

(a. Patent deed) b. Patent pending c. Provisional application d. Patent offered

If a patent application has been filed, but the patent has not yet been granted, how should the inventor label the product?

(a. Patent pending) b. Patent deed c. Provisional application d. Temporary patent

If an individual believes a protected trademark has been wrongfully used to sell a good or service, that individual would pursue a claim of trademark ______.

(a. infringement) b. theft c. dilution d. copyright

The name "1-Click" that identifies Amazon's ordering process is protected as a ______.

(a. trade secret) b. patent c. trademark d. copyright

Rock Band willfully infringed on the copyrighted work of another songwriter. What penalty should Rock Band expect to pay?

a. $35,000 per act (b. $150,000) c. Unlimited dollar damages d. $500 per act

Damages resulting from cybersquatting can be assessed up to ______.

a. $500 b. $5,000 c. $10,000 (d. $100,000)

The symbol ® indicates which of the following?

a. A trademark pending b. A service mark pending (c. A trademark has been issued) d. A copyright has been issued

The Trademark Dilution Revision Act provides legal remedy for which of the following?

a. Actual dilution b. Intentional dilution (c. Likelihood of dilution) d. Subjective dilution

Under the No Electronic Theft Act, which type of charges are brought against a copyright infringer?

a. Civil (b. Criminal) c. Willful d. Dilution

Hailey believes her new business name, Hailey's Cometz, is original and should be protected intellectual property. Hailey should file for which of the following?

a. Copyright b. Patent c. Service Mark (d. Trademark)

Jed invents a self-walking dog leash, and his neighbor watched through the window as Jed invented this leash. Jed would need to file which of the following to protect his invention from copying?

a. Copyright b. Trademark (c. Patent) d. Service mark

Which of the following would NOT be protected by copyright law?

a. Creative new computer programs b. Creative videos (c. Creative thinking) d. Original, creative poems

Which of the following marks are NOT protected because they are NOT distinctive?

a. Descriptive b. Suggestive c. Arbitrary (d. Generic)

Tony is a gardener who has created a new rose that lives longer, is hardier, and is black when it first blooms, then it turns blue. Tony has decided to apply for which type of patent?

a. Design (b. Plant) c. Utility d. Deed

Unauthorized access of a computer is subject to the ______.

a. Digital Millennium Copyright Act (b. Computer Fraud and Abuse Act) c. Lanham Act d. Anti-Fraud Act

Misappropriation of a trade secret does NOT include which of the following?

a. Disclosing the trade secret without express or implied consent b. Using improper means to acquire knowledge of the trade secret (c. Attempting to copy the trade secret) d. Acquiring the trade secret through another person who has reason to know that the action was improper

A product that is similar in function to a patented product but does not violate the individual elements of a patent is an example of what type of infringement?

a. Doctrine of equivalents b. Law of omission c. Law of exactness (d. Indirect patent infringement)

Which act provides fines and/or imprisonment for trademark infringement?

a. Dodd-Frank Act (b. Lanham Act) c. Sarbanes-Oxley Act d. Antifraud Act

If a person requests a business stop emailing them, the punishment for repeated violations is provided under the ______.

a. Economic Espionage Act b. Digital Millennium Copyright Act (c. CAN-SPAM Act) d. No Electronic Theft Act

Remedies for patent infringement are ______.

a. Equitable b. Legal (c. equitable and legal) d. statutory in nature

Which of the following is true about information protected under the Uniform Trade Secrets Act?

a. It protects customer identification. (b. It derives independent economic value.) c. It protects an advertising rollout. d. It is published by the business.

Stealing a trade secret, including copying or transmitting a trade secret without permission, is punishable under the ______.

a. No Electronic Theft Act b. Lanham Act c. CAN-SPAM Act (d. Economic Espionage Act)

Computer software is protected under cyber law as which form of intellectual property?

a. Patent b. Trademark c. Copyright d. Service mark

Protection for seventy years plus the life of the creator is protection under which of the following?

a. Patent b. Trademark c. Service mark (d. Copyright)

Steve has been granted a design patent to protect his invention. How long is Steve's patent valid?

a. Seven years b. Ten years (c. Fourteen years) d. Twenty years

Microsoft believes that another company, Macrosoft, is lessening the value of its brand with the use of a similar trademark. Under which legal action would Microsoft seek relief?

a. Trademark invasion b. Trademark breach c. Trademark infringement (d. Trademark dilution)

A patent provides the patent holder the legal right to do which of the following?

a. Use words, names, or symbols for identification b. Protect the original work of the holder c. Protect valuable information used in a commercial enterprise (d. Exclude others from making or selling the invention)

A party being sued for patent infringement may use which of the following as a defense?

a. Veiled attempt (b. Statutory bar) c. Illusory infringement d. Infringement per se

Distinctiveness of the holder's mark is needed to establish _______ infringement.

a. copyright b. patent (c. trademark) d. service mark

Money damages for patent violation CANNOT be ______.

a. enforceable by law (b. less than a reasonable royalty) c. based on statutory law d. at the discretion of the court

A trademark is initially protected for ______ years.

a. five b. seven (c. ten) d. twenty

Louie owns a home brewery and has developed a new beverage. His nosy neighbor keeps asking for the recipe. Louie should treat the beverage as a ______.

a. patent b. trademark (c. trade secret) d. copyright

Customer shopping preferences can be encrypted to protect them as an Internet retailer's ______.

a. patent b. trademark (c. trade secret) d. service mark

An application that provides limited rights for a patent for one year is a ______.

a. patent deed b. patent pending (c. provisional application) d. patent offered

If an inventor finds someone using the patented invention, the inventor can file a claim for patent ______.

a. pending b. deception c. breach (d. infringement)

A trademark can be any of the following EXCEPT a _______.

a. slogan b. logo c. symbol (d. person)

If someone registers a domain name similar to a trademarked domain name, that person can be charged with _________.

a. trade secret infringement (b. cyber-squatting) c. copyright infringement d. patent infringement

A formula, pattern, compilation, program, technique, or process held within the company is protected as a ______.

a. trademark . (b. trade secret) c. patent d. copyright

Prohibiting a musician from playing another musician's music without consent is a protection provided by a ______.

a. trademark b. patent (c. copyright) d. trade secret

A patent gives the inventor exclusive rights to the invention forever.

false

A provisional application provides full patent protection for one year.

false

An educational setting cannot use copyrighted software unless permission has been granted.

false

Patent misuse is NOT a valid defense in patent infringement.

false

The Lanham Act describes copyright as any distinctive word, name, or symbol that identifies a good or service.

false

The statutory period for copyright protection ends when an author dies.

false

Toni has written the great American novel. She should seek patent protection.

false (copyright)

A copyright infringer can face criminal charges.

true

A trademark must identify and distinguish the product from similar products.

true

A useful innovative item or process would be protected by a utility patent.

true

After filing an application for a patent, the inventor should label the product "patent pending" until the patent is issued.

true

An injunction is an appropriate remedy for theft of a trade secret.

true

Consumer confusion is the primary concern in trademark infringement cases.

true

Copying and sharing copyrighted material over the Internet without permission is subject to felony prosecution.

true

Direct copyright infringement is considered easy to prove.

true

Hacking is a felony under the Computer Fraud and Abuse Act.

true

If a copyright infringement occurs in a foreign jurisdiction, a lawsuit must be brought in the court of the foreign country.

true

If someone is commissioned to complete work on behalf of the copyright owner, then that person is NOT considered the copyright owner.

true

Inventions and methods are protected by patents.

true

It is possible to patent a process that includes a computer program.

true

Literary, dramatic, musical, artistic, and other intellectual works are protected under copyright law.

true

Making, using, or selling a patented invention if you are not the holder of the patent is infringement.

true

Misappropriation is the term used for obtaining and using a trade secret improperly.

true

Once a trademark has been obtained, the person who holds the trademark is responsible for policing the mark.

true

Once a trademark is registered, the symbol ® can be used

true

Only a registered trademark should use the ® symbol.

true

Only tangible forms of work can be copyrighted.

true

Providing notice of the copyright precludes an infringer from attempting to establish they are an innocent infringer.

true

Substances that appear naturally (such as copper) are NOT patentable.

true

The appearance of a product is protected by a design patent.

true

The symbols TM or SM provide that an application for trademark protection is pending.

true

The two basic requirements of a patent are that the creation is novel and nonobvious.

true


संबंधित स्टडी सेट्स

New York Times - Narendra Modi of India Meets Pakistani Premier

View Set

To what extent was the Byzantine Empire a continuation or departure of the Roman Empire?

View Set

HGD Ch 12/13: Adulthood, Family, Older Adulthood

View Set

Chapter 19 Politics and Economics

View Set