CIS 50- Ethics in Info. Tech (CHAPTER 6)
_____ allows portions of copyrighted materials to be used without permission under certain circumstances.
Fair use doctrine
A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.
False
A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators.
False
Because organizations can risk losing trade secrets when key employees leave, they often try to prohibit employees from revealing secrets by adding non-compete clauses to employment contracts.
False
Competitive intelligence analysts must be authorized to take unethical or illegal actions in the normal course of their job.
False
Competitive intelligence involves the gathering and analysis of the trade secrets of your competitors.
False
Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own.
False
Formulas, inventions, and processes are not considered forms of intellectual property.
False
Industrial espionage and competitive intelligence are essentially the same.
False
_____ is the act of stealing someone's ideas or words and passing them off as one's own.
Plagiarism
__ is the existing body of knowledge available to a person of ordinary skill in the art.
Prior art
_____ is the process of taking something apart in order to understand it, build a copy of it, or improve it.
Reverse engineering
A common use of open source software is to move data from one application to another and to extract, transform, and load business data into large databases.
True
A copyright is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work.
True
Defining and controlling the appropriate level of access to intellectual property are complex tasks.
True
In the early days of the Web, many cybersquatters registered domain names for famous trademarks or company names to which they had no connection.
True
A patent is a grant of a property right issued by the _____ to an inventor.
USPTO
Legally obtained information that is gathered to help a company gain an advantage over its rivals is called _____.
competitive intelligence
A(n) _____ can read the machine language of a software program and produce the source code.
decompiler
Identify what types of work are eligible to be copyrighted.
literary works which can be included in computer programming, audiovisual works, graphics, sounds recording, motion pictures, pantomimes, pictures, between other types of works that involve intellectual creativity & originality.
A(n) _____ prohibits a departing employee from working for any competitors for a period of time.
noncompete agreement
Firefox and OpenOffice are all examples of _____.
open source software
Cybersquatters _____.
register domain names for famous trademarks or company names to which they have no connection
A _____ claims as its invention some feature or process embodied in instructions executed by a computer.
software patent
A(n) _____ is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's.
trademark