• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
The ____ is the trade group that represents the U.S. recording industry
RIAA
These objects are protected under patent law: ____
inventions
Copyright and patent protection was established through ____
the U.S. Constitution
The concept that an idea cannot be copyrighted but the ____ of an idea can be is key to understanding copyright protection.
expression
The PRO-IP Act sends the message to intellectual property criminals everywhere that the U.S. will ____ to protect American innovation.
go the extra mile
The ____ requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations.
TRIPS agreement
Unlike traditional copyright law, the ____ does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use.
Digital Millennium Copyright Act
One of the tests that an invention must pass to be eligible for a patent is ____.
it must not be obvious to a person having ordinary skill in the same field
The U.S. Supreme Court has ruled that there are ____ classes of items that cannot be patented
three
Some software experts think that too many software patents are being granted, inhibiting new software development. For example, ____ obtained a patent for “one-click shopping,” based on the use of a shopping cart purchase system for electronic commerce.
Amazon.com
In 2009, ____ announced that it would donate some 3,000 patents for free use by developers to help them innovate and build new hardware and software. The announcement represented a major shift in this firm’s intellectual property strategy and was meant to encourage other patent holders to donate their own intellectual property.
IBM
A patented process or invention that is surreptitiously included within a standard without being made public until after the standard is broadly adopted is called a(n) ____.
submarine patent
One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is ____.
there is no need to file an application or disclose the trade secret to gain protection
____ can qualify for trade secret protection under the Uniform Trade Secrets Act.
Both computer hardware and software
A(n) ____ prohibits an employee from working for any competitors for a period of time
noncompete agreement
The process of taking something apart in order to understand it, build a copy of it, or improve it is called ____.
reverse engineering
A(n) ____ can read the machine language of a software program and produce the source code.
decompiler
The courts have ruled in favor of using reverse engineering to enable ____.
interoperability
7-zip, Audacity, Blender 3D, eMule, Eraser, and Firefox are all examples of ____
open source software
Legally obtained information that is gathered to help a company gain an advantage over its rivals is called ____.
competitive intelligence
A(n) ____ is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company’s products from another’s.
trademark
The ____ Act enacted in 1999, allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts.
Anticybersquatting Consumer Protection
Cybersquatters ____.
register domain names for famous trademarks or company names to which they have no connection
Under the ACPA, trademark holders can seek civil damages of up to ____ from cybersquatters that register their trade names or similar-sounding names as domain names.
$100,000
The basic premise behind open source code is that when many programmers can read, redistribute, and modify a program’s code, the software ____.
improves