Chapt 5 Flashcards

(37 cards)

1
Q

CBA

A

cost-benefit analysis (CBA) for security estimates the strengths and weaknesses of the approaches you are considering so you can find the best methods to use to achieve security improvements at the lowest cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ROI

A

Return on investment (ROI) is the percentage comparing the net profit and cost of investment when you make an investment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCO

A

Security total cost of ownership (TCO) is used to calculate the total cost of the security steps your organization is contemplating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data

A

data is raw values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information

A

information is processed from data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Contextualization

A

Contextualization (why the data was gathered)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Categorization

A

Categorization (the key components of the data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Calculation

A

Calculation (mathematical or statistical analysis)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Condensation

A

Condensation (summarizing, graphing, or presenting data in tables)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Five C’s or 5 steps data needs to go through to become information

A

Contextualization, categorization, calculation, corrections, condensation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intellectual property

A

Intellectual property is a creative work or invention that can be patented, copyrighted, or trademarked
I.e. book, a movie, a video game, or a computer program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data correlation

A

Data correlation is a statistical association, commonly thought to be a close relationship, between two items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Meaningful reporting

A

Meaningful reporting provides the information needed to help an organization make an informed decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

^(TM)

A

Used for products, services, and features. A superscripted capital TM indicates a trademark

You can apply a trademark to any goods you sell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

^(SM)

A

superscripted capital SM indicates a service mark (SM)
You ac apply a service mark to any services you provide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

R

A

capital R in a circle indicates a registered trademark
A registered trademark is a trademark that has been registered with the U.S. Patent and Trademark Office

17
Q

Copyright

A

A copyright provides the creator of an original work the right to determine whether and how their work can be used by others, lasts for a limited period of time

18
Q

Patent

A

A patent is an exclusive right to prevent others from the marketing, sale, or use of an invention without the permission of a patent holder for a specified period of time (typically 20 years).

19
Q

Data-Driven Business Decisions

A

The process of using data to inform what a business does is known as data-driven business decisions. This process involves at least three steps:
Data capture and collection, Data correlation, Meaningful reporting

20
Q

Patent trolls

A

Companies that make a living from buying patents and suing other companies they claim are infringing on their patents are sometimes referred to as patent trolls.

21
Q

Which of the following activities is not considered an input?
Typing, Scanning, Printing, Recording

22
Q

Which of the following best expresses the relationship of data and information?

Data is the same as information.
Information must be gathered to create data.
Data and information are not related.
Data is the source of information.

A

Data is the source of information

23
Q

In the process of turning data into information, which of the following comes first?

Make decisions influenced by the data.
Gather data.
Analyze data.
Ignore data that conflicts with your feelings.

24
Q

Your company has applied for a service mark on a service name. Which of the following marks would be used initially and after the service mark is registered?

SM, ©
™, ®
∫, ®
SM, ®

25
Which of the following describes what copyleft does? Copyleft negates a copyright. Copyleft discourages the adaptation of open source software. Copyleft allows an open source app to be modified, but prevents the modified version from being modified by others. Copyleft allows an open source app and its modified versions to be modified freely by others.
Copyleft allows an open source app and its modified versions to be modified freely by others.
26
Company ABC is suing Company XYZ for patent infringement. If Company ABC’s patents don’t really apply to Company XYZ’s product, what is Company ABC doing? Being a patent king Being a copyright infringer Being a trademark violator Being a patent troll
Patent troll
27
Which of the following statements most accurately reflects what data correlation does? Determining how one factor causes another factor Deciding that two types of data are identical Determining the statistical relationship between two types of data Determining that both types of data are caused by a third type of data
Determining the statistical relationship between two types of data
28
You receive a memo about a recent report labeled “too much, MEGO.” Which of the following is the best explanation of what needs to be fixed? Add more background detail. Reduce background detail. Add pie charts. Make report longer.
Reduce background detail.
29
Your company has just patented a process it has no intention of producing. Which of the following describes what the company is doing? Enabling other companies to freely use the process Preventing other companies from using the process Becoming a patent troll Filing for a registered trademark
Preventing other companies from using the process
30
Your company has trademarked “We make sprockets as easy as 1-2-3” for its sprocket business. When the company starts selling sprockets in a different state, the legal department discovers that another business is using the same trademark. Which of the following might best help preserve your company’s investment in the trademark? Try to register the trademark. Abandon the trademark. Change the trademark into a service mark. Sue the other company.
Try to register the trademark.
31
Your company has decided to switch from physical distribution of its commercial software to using digital distribution via download. You discover a large company has downloaded your software and figured out how to install the software and make it run without paying for it. Which of the following should your company do? Nothing. Downloadable software is always free. Check to see if the software patent covers downloadable software. Take legal action for copyright infringement. Make sure the download site has a proper trademark.
Take legal action for copyright infringement.
32
Your supervisor has asked you to generate a document from data that will provide useful information and lead to a data-driven decision. What is this called? Data correlation Microsoft Word analysis Database mining Meaningful reporting
Meaningful reporting
33
Which of the following represents a statistical relationship between two types of data? Data capture and collection Data correlation Data extrapolation Intellectual data property (IDP)
Data correlation
34
Which of the following is a legal right used to prevent unauthorized parties from copying an invention? Patent Service mark Registered trademark End-user license agreement (EULA)
Patent
35
What are inventions, writings, art, photography, computer programs, and other creations of the mind considered? Personal information (PI) Copyrights of the thinkers (CotT) Digital products Intellectual property
Intellectual property
36
Which of the following best describes digital security? Encrypted data that has been unencrypted, interpreted, and processed to become meaningful for a particular question, situation, or requirement Processes, methods, and attitudes leading to protecting data, information, processes, and personal information held by an organization Information that is stored electronically and can be retrieved or transmitted in a private fashion through cryptographic functions Being safe and comfortable in a controlled environment
Processes, methods, and attitudes leading to protecting data, information, processes, and personal information held by an organization
37
You have recently developed a new video game and believe it will be the next huge hit. You want to call it “Fortnite: Two-weeks to victory!” Where would you check to see if this name is already taken and if you can even use this title? The Library of Congress Epic Games, Inc. U.S. Patent and Trademark Office The Intellectual Property Office (IPO)
U.S. Patent and Trademark Office