Chapter 6
Unlike traditional copyright law, the _____ does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use. TRIPS Agreement Digital Millennium Copyright Act (DMCA) WIPO Copyright Treaty Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act
Digital Millennium Copyright Act (DMCA)
_____ allows portions of copyrighted materials to be used without permission under certain circumstances. Plagiarism Copyright infringement Fair use doctrine Use of prior art
Fair use doctrine
A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators. True False
False
Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own. True False
False
Reverse engineering can only be applied to computer hardware, not computer software. True False
False
The term of copyright has been extended several times from its original limit of 25 years to 35 years. True False
False
_____ is the process of taking something apart in order to understand it, build a copy of it, or improve it. Plagiarism Patent infringement Reverse engineering Decompiling
Reverse engineering
A copyright is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work. True False
True
Software, video games, multimedia works, and Web pages can all be copyrighted. True False
True
A(n) _____ prohibits a departing employee from working for any competitors for a period of time. noncompete agreement license agreement nondisclosure agreement union agreement
noncompete agreement
Cybersquatters frequently launch denial-of-service attacks against popular Web sites register domain names for famous trademarks or company names to which they have no connection remain connected to popular Web sites for extremely long periods of time making it difficult for others to obtain service employ phishing tactics using the domain names of popular Web sites
register domain names for famous trademarks or company names to which they have no connection
A(n) _____ is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's. trade secret watermark trademark earmark
trademark