CSIT120 Tech Chapter 6
Copyrights like the ones in the accompanying figure for works registered by an organization (or as anonymous works) last ____ years from the date of publication or 120 years from the date of creation, whichever is shorter.
95
____, used in conjunction with business documents, can protect a sensitive business document by controlling usage of that document, such as who can view, print, or copy it.
DRM software
To catch people who are sharing movies illegally on the Internet, the MPAA uses special software that monitors file sharing networks to find copyrighted movies and then identifies the responsible individual by using the ____ of the computer being used to share the movie.
IP address
The Digital ____ Copyright Act makes it illegal to circumvent antipiracy measures built into digital media and devices.
Millennium
It is never legal to download unauthorized music from ____ sites without compensating the artist and the record label.
P2P
A ____ is a policy, often for a school or business, that specifies allowable use of resources such as computers and other equipment.
code of conduct
A(n) ____ is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, musical composition, or painting.
copyright
Ethical decisions need to be made whenever a business practice or product is legal or socially acceptable in one country, but not another. One example is ____.
copyright law
Honor codes like that being signed in the accompanying figure help prevent ____.
creating plagiarized material texting answers to others storing notes on a smartphone
The acquisition of a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as ____.
cybersquatting
In addition to being a copyright concern, ____ can be used to misquote individuals, repeat comments out of context, retouch photographs—even to create false or misleading photographs.
digital manipulation
In addition to the problem of unethical ____, the use of digital cameras today virtually eliminates any concrete evidence—namely, negatives.
digital manipulation
A ____ like that being used in the accompanying figure is a subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder.
digital watermark
In addition to being annoying and a waste of time, ____ bog(s) down e-mail systems and clog(s) users' Inboxes.
email hoaxes
A teacher can legally read a copyrighted poem for discussion in a poetry class under the legal concept of ____.
fair use
Jenna cautions employees that trademark law also protects domain names that ____, such as Amazon.com and Lego.com.
match a company's trademark
A teacher sharing a poem with a class, leading the class to believe the poem was his original work, is engaging in ____.
plagiarism
Presenting someone else's work as your own is referred to as ____, which is illegal and unethical.
plagiarism
During her training session, Jenna posits that the symbol ® is reserved for ____.
registered trademarks registered service marks
If you saw a copyright mark as shown in the accompanying figure and wanted to use those materials, you would first obtain permission from ____ and pay any required fee.
the copyright holder