Ch. 6 Questions

Ace your homework & exams now with Quizwiz!

12. Plagiarism is an issue only in academia. True or False?

False

5. Two software manufacturers develop separate but nearly identical programs for playing an online game. Even though the second manufacturer can establish that it developed the program on its own, without knowledge of the existing program, that manufacturer could be found guilty of copyright infringement. True or False?

False

14. As part of the patent application, the USPTO searches the existing body of knowledge that is available to a person of ordinary skill in the art. This existing body of knowledge is also called _______.

Prior art

13. The process of taking something apart in order to understand it, build a copy of it, or improve it is called ________.

Reverse engineering

11. The WTO developed the _________, which established minimum levels of protection that each government must provide to the intellectual property of all WTO members.

Trade-Related Aspects of Intellectual Property Rights (TRIPS) Agreement

7. A(n) ______ is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's.

Trademark

15. Almost all the data needed for competitive intelligence can be collected either through carefully examining published information or through interviews. True or False?

True

3. Software can be protected under copyright law, but it can also be patented. True or False?

True

4. The courts may award up to triple damages for which of the following? a. patent infringement b. copyright infringement c. trademark infringement d. theft of trade secrets

a

10. A ________ is a form of protection for intellectual property that does not require any disclosures or the filing of an application. a. copyright b. patent c. trade secret d. trademark

c

2. Copyright law protects authored works; ______ law protects inventions.

patent

6. Title II of the ______ amends the Copyright Act by adding a new section that enables a Web site operator that allows users to post content on its Web site to avoid copyright infringement if certain "safe harbor" provisions are followed.

Digital Millennium Copyright Act (DMCA)

8. Many large software companies have _________ agreements with each other in which each agrees not to sue the other over patent infringement.

Cross-Liscensing

16. The main tactic used to circumvent _______ is to register numerous domain name variations as soon as an organization thinks it might want to develop a Web presence.

cybersquatting

1. Which of the following is an example of intellectual property? a. a work of art b. a computer program c. a trade secret of an organization d. all of the above

d

9. The _________ doctrine established four factors for courts to consider when deciding whether a particular use of copyrighted property is fair and can be allowed without penalty.

fair use


Related study sets

5 - (Questions) Life Insurance Premiums, Proceeds, and Beneficiaries

View Set

Midterm set 2 - Recruitment and Selection

View Set

Комп’ютерна лексикографія

View Set

HESC 450 Midterm Study Guide (CH 1-7 /Not Ch 6)

View Set

Intro To Surgical Technology: Legal Concepts

View Set