Chapter 6

Ace your homework & exams now with Quizwiz!

Unlike traditional copyright law, the _____ does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use. TRIPS Agreement Digital Millennium Copyright Act (DMCA) WIPO Copyright Treaty Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act

Digital Millennium Copyright Act (DMCA)

_____ allows portions of copyrighted materials to be used without permission under certain circumstances. Plagiarism Copyright infringement Fair use doctrine Use of prior art

Fair use doctrine

A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators. True False

False

Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own. True False

False

Reverse engineering can only be applied to computer hardware, not computer software. True False

False

The term of copyright has been extended several times from its original limit of 25 years to 35 years. True False

False

_____ is the process of taking something apart in order to understand it, build a copy of it, or improve it. Plagiarism Patent infringement Reverse engineering Decompiling

Reverse engineering

A copyright is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work. True False

True

Software, video games, multimedia works, and Web pages can all be copyrighted. True False

True

A(n) _____ prohibits a departing employee from working for any competitors for a period of time. noncompete agreement license agreement nondisclosure agreement union agreement

noncompete agreement

Cybersquatters frequently launch denial-of-service attacks against popular Web sites register domain names for famous trademarks or company names to which they have no connection remain connected to popular Web sites for extremely long periods of time making it difficult for others to obtain service employ phishing tactics using the domain names of popular Web sites

register domain names for famous trademarks or company names to which they have no connection

A(n) _____ is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's. trade secret watermark trademark earmark

trademark


Related study sets

E-Commerce- Review Test 3: 8.03 Classes Link/Tables (Test 3)

View Set

Nclex Peds Growth and Development Chapter 25-29

View Set

CH 9 MASTERING - BIOTECHNOLOGY & DNA TECHNOLOGY

View Set

cell bio test #1; part one- chapters 1-2

View Set

Final Exam International Business (Chapters 7-11)

View Set

All the Business Note Cards for the Final

View Set