IS3350 CHAPTER 10 Flashcards Preview

CSC 6530 SECOND-TERM > IS3350 CHAPTER 10 > Flashcards

Flashcards in IS3350 CHAPTER 10 Deck (30)
Loading flashcards...
1

A sworn written statement is called ___?

AFFIDAVIT

2

This is used to protect book, art, music, videos, computer programs, and other creative works and is called ___?

COPYRIGHTS

3

Issued to protect new and original ornamental designs for manufactured objects is called ___?

DESIGN PATENTS

4

A copyright law concept that some use of copyright law concept that some use of comp righted works in limited ways isn't copyright infringement is called ___?

FAIR USE

5

The area of law that protects a person's creative ideas, inventions, and innovations. Its is protected by patents, trade secrets, trademarks, and copyright is called ___?

INTELLECTUAL PROPERTY

6

The actions that the US Patent and Trademark Office must complete in order to reflect a patent application or issue a patent application or issue a patent is called ___?

PATENT PROSECUTION

7

Used to protect inventions like machines, processes, designs, and specialized plants is called ___?

PATENTS

8

Issued to protect inventions or discoveries of new varieties of plants that are reproduced asexually is called ____?

PLANT PATENTS

9

Evidence of public knowledge about an invention that existed prior to a claimed invention or discovery date is called ___?

PRIOR ART

10

Refers to the collection of works that are free for public use. It includes works where the copyright has expired. It also includes some government works is called ___?

PUBLIC DOMAIN

11

Used to protect works, logos, symbols, or slogans that identify a service is called ___?

SERVICEMARK

12

A legal concept that means that a person can be held responsible responsible for their actions even if they didn't intend to cause harm to another person is called ___?

STRICK LIABILITY

13

Used to protect formulas, processes, and methods that give a business or competitive edge is called ___?

TRADE SECRETS

14

Used to protect words, logos, symbols, or slogans that identify a product or service is called ___?

TRADEMARKS

15

Issued to protect inventions and discoveries such as machines, manufactured products, processes, and compositions of matter is called ___?`

UTLITY PATENTS

16

1. What two intellectual property methods can be used to protect computer software?

1. Patents
2. Trademarks
3. Copyrights
4. 1 & 2
5. 1 & 3

Patents

Copyrights

17

2. What is strict liability?

A legal concept that means that people can be held responsible for their actions even if they didn't intend to cause harm to another person.

18

3. A design patent can be used to protect computer software.
TRUE OR FALSE

FALSE

19

4. A utility patent has a ___ -year term.

20

20

5. Which type of intellectual property protection is mentioned in the US Constitution?

1. Patents
2. Trademarks
3. Copyrights
4. 1 & 2
5. 1 & 3

Patents

Copyrights

21

6. What is the main difference between patents and trade secrets?

1. A trade secret is public, a patent is confidential
2. A trade secret protects a process, a patent protects a machine
3. A trade secret is confidential, a patent is public
4. A trade secrete protects a machine, a patent protects a process
5. None of the above

A trade secret is confidential, a patent is public

22

7. What are the two basic requirements to register a trademark with the US Patent and Trademark Office?

A person or business must use trademark in interstate commerce, and the trademark must be distinctive

23

8. The US Patent and Trademark Office publishes the "Official Gazette" to give public notice about patents and trademarks.
TRUE OR FALSE

TRUE

24

9. What must an author do to protect his or her copyrighted works?

1. Mark it with a (copyright symbol)
2. Register it with the US Copyright Office
3. Nothing, copyright protection is automatic
4. Pay a fee to the Library of Congress
5. None of the above

Nothing, copyright protection is automatic

25

10. Which DMCA safe harbor is called the "conduit" exception?

1. Transitory communications safe harbor
2. System caching safe harbor
3. Information storage safe harbor
4. Information location tools safe harbor
5. None of the above

Transitory communications safe harbor

26

11. Which type of intellectual property protection is governed by federal and state law?

1. Patents
2. Copyrights
3. Trademarks
4. 1&2 only
5. None of the above

Trademarks

27

12. what is the trademark registration period?

1. 10 years
2. 14 years
3. 20 years
4. 70 years
5. None of the above

10 years

28

13. Why is it important to know who is the owner of a copyrighted work?

It's important to know the ownership of a copyrighted work in order to determine the length of copyright protection.

29

14. What must a person show to prove trademark infringement?

1. Ownership of a trademark
2. That the defendant used a similar trademark in commerce
3. That the defendant's use of a similar trademark is likely to confuse consumers
4. 1 & 2
5. 1, 2, & 3

Ownership of a trademark

That the defendant used a similar trademark in commerce

That the defendant's use of a similar trademark is likely to confuse consumers

30

15. What is cybersquatting?

1. When a person owns a patent but doesn't make, use, or sell their invention
2. When a person owns a patent but doesn't make, use, or sell their invention
3. When a person uses the copyrighted materials of another without appropriate acknowledgement
4. When a person publicly advertises the sensitive confidential information of a business or other entity on the Internet
5. None of the above

When a person owns a patent but doesn't make, use, or sell their invention