Chapter 6 Flashcards

(30 cards)

1
Q

protect individuals online from predation.

A

Computer Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names, and images used in commerce.

A

Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 main types of Intellectual Property:

A

*Patents
*Trademarks
*Copyrights
*Trade Secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Used to protect inventive ideas or processes. It is what most often come to mind when thinking of IP protection.

A

Patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

are used to protect newly engineered plant species or strains

A

Patents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Patents result from the following stages:

A

*conceptualization
*Invention Disclosure
*Patent Application
*Maintenance
*cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is the overarching name for activities that include management of paperwork and meeting filing deadlines specified by the government patent office.

A

Docketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

it protects words, phrases, symbols, sounds, smells, and color schemes. Often considered assets that describe or otherwise identify the source of underlying products or services that a company provides.

A

Trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

do not protect ideas, but rather the manner in which ideas are expressed. “original works of authorship”

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

allow the owner of the protected materials to control reproduction, performance, new versioning or adaptation of works.

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

are proprietary procedures, systems, formulas, strategies, or other information that is confidential and exclusive to the company using them.

A

Trade Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It means respecting other users’ views and displaying common courtesy when posting your views to online discussion groups.

A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

refers to the instruction, communication with, storing data, in retrieving data from, or otherwise making use of any resources of a computer system.

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

refers to the modification or change, in form or substance, of an existing computer data or program.

A

Alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

refers to the transmission of information through ICT media, including voice, video, and other forms of data.

A

Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

refers to an electronic, magnetic, optical, electrochemical, or other data processing or communication device.

17
Q

refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system.

A

Computer Data

18
Q

refers to a set of instructions executed by the computer to achieve intended results.

A

Computer Program

19
Q

refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data.

A

Computer System

20
Q

refers to a computer or a computer network, the electronic medium in which online communication takes place.

21
Q

refers to the collection of tools, policies, risk management approaches, actions, training used to protect the cyber environment

A

Cybersecurity

22
Q

refers to a presentation of information, knowledge, facts, concepts, or instructions which are processed and are intended for use in a computer system.

23
Q

refers to listening to, recording, monitoring or surveillance of the content of communications.

24
Q

refers to any information contained in the form of computer data or any other form that is held by a service provider.

A

Subscriber’s Information

25
the access to the whole or any part of a computer system without right.
illegal Access
26
the interception made by technical means without right of any non-public transmission.
Illegal Interception
27
the intentional or reckless alteration, damaging, deletion, or deterioration of computer data.
Data Interference
28
the intentional alteration or reckless hindering or interference with the functioning of a computer or computer network.
System Interference
29
the acquisition of a domain name over the internet in bad faith to profit.
Cybersquatting
30
the willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organ or sexual activity.
Cybersex