Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
The ____ is the trade group that represents the U.S. recording industry
|
RIAA
|
|
These objects are protected under patent law: ____
|
inventions
|
|
Copyright and patent protection was established through ____
|
the U.S. Constitution
|
|
The concept that an idea cannot be copyrighted but the ____ of an idea can be is key to understanding copyright protection.
|
expression
|
|
The PRO-IP Act sends the message to intellectual property criminals everywhere that the U.S. will ____ to protect American innovation.
|
go the extra mile
|
|
The ____ requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations.
|
TRIPS agreement
|
|
Unlike traditional copyright law, the ____ does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use.
|
Digital Millennium Copyright Act
|
|
One of the tests that an invention must pass to be eligible for a patent is ____.
|
it must not be obvious to a person having ordinary skill in the same field
|
|
The U.S. Supreme Court has ruled that there are ____ classes of items that cannot be patented
|
three
|
|
Some software experts think that too many software patents are being granted, inhibiting new software development. For example, ____ obtained a patent for “one-click shopping,” based on the use of a shopping cart purchase system for electronic commerce.
|
Amazon.com
|
|
In 2009, ____ announced that it would donate some 3,000 patents for free use by developers to help them innovate and build new hardware and software. The announcement represented a major shift in this firm’s intellectual property strategy and was meant to encourage other patent holders to donate their own intellectual property.
|
IBM
|
|
A patented process or invention that is surreptitiously included within a standard without being made public until after the standard is broadly adopted is called a(n) ____.
|
submarine patent
|
|
One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is ____.
|
there is no need to file an application or disclose the trade secret to gain protection
|
|
____ can qualify for trade secret protection under the Uniform Trade Secrets Act.
|
Both computer hardware and software
|
|
A(n) ____ prohibits an employee from working for any competitors for a period of time
|
noncompete agreement
|
|
The process of taking something apart in order to understand it, build a copy of it, or improve it is called ____.
|
reverse engineering
|
|
A(n) ____ can read the machine language of a software program and produce the source code.
|
decompiler
|
|
The courts have ruled in favor of using reverse engineering to enable ____.
|
interoperability
|
|
7-zip, Audacity, Blender 3D, eMule, Eraser, and Firefox are all examples of ____
|
open source software
|
|
Legally obtained information that is gathered to help a company gain an advantage over its rivals is called ____.
|
competitive intelligence
|
|
A(n) ____ is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company’s products from another’s.
|
trademark
|
|
The ____ Act enacted in 1999, allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts.
|
Anticybersquatting Consumer Protection
|
|
Cybersquatters ____.
|
register domain names for famous trademarks or company names to which they have no connection
|
|
Under the ACPA, trademark holders can seek civil damages of up to ____ from cybersquatters that register their trade names or similar-sounding names as domain names.
|
$100,000
|
|
The basic premise behind open source code is that when many programmers can read, redistribute, and modify a program’s code, the software ____.
|
improves
|