Question: The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.
Answer Choices: False
True
Answer: False
Question: Legally obtained information that is gathered to help a company gain an advantage over its rivals is called which of the following?
Answer Choices: competitive intelligence
prior art
industrial espionage
trade secrets
Answer: competitive intelligence
Question: Which of the following established the minimum levels of protection that each country must provide to all WTO members?
Answer Choices: World Trade Organization (WTO)
The World Intellectual Property Organization (WIPO)
Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Digital Millennium Copyright Act (DMCA)
Answer: Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Question: The courts have ruled in favor of using reverse engineering to:
Answer Choices: allow the domination of a particular software market by a single manufacturer
provide access to protected elements of an original work
circumvent restrictive trade secrets
enable interoperability
Answer: enable interoperability
Question: Which of the following terms is defined as the existing body of knowledge available to a person of ordinary skill in the art?
Answer Choices: Prior art
Body of practice
Prior experience
Known facts
Answer: Prior art
Question: Which of the following enables a DVD player or a computer drive to decrypt, unscramble, and play back motion pictures on DVDs, but not copy them?
Answer Choices: DeCSS
Content Scramble System (CSS)
Time Warner Cable system
RIAA
Answer: Content Scramble System (CSS)
Question: Which of the following requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations?
Answer Choices: WIPO Copyright Agreement
PRO-IP Act
TRIPS agreement
DMCA
Answer: TRIPS agreement
Question: Cybersquatters:
Answer Choices: frequently launch denial-of-service attacks against popular Web sites
register domain names for famous trademarks or company names to which they have no connection
employ phishing tactics using the domain names of popular Web sites
remain connected to popular Web sites for extremely long periods of time
Answer: register domain names for famous trademarks or company names to which they have no connection
Question: Which of the following can read the machine language of a software program and produce the source code?
Answer Choices: re-engineering device
decompiler
compiler
open source decoder
Answer: decompiler
Question: A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.
Answer Choices: True
False
Answer: False
Question: Open source code is any program whose source code is made available for use or modification, as users or other developers see fit.
Answer Choices: True
False
Answer: True
Question: Which act allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts?
Answer Choices: ACPA
CAN-SPAM Act
Economic Espionage Act
PRO-IP Act
Answer: ACPA
Question: Which of the following claims as its invention some feature or process embodied in instructions executed by a computer?
Answer Choices: cross-licensing agreement
software patent
patent infringement
trade secret
Answer: software patent
Question: Which of the following terms is used to describe the act of stealing someone’s ideas or words and passing them off as one’s own?
Answer Choices: Reverse engineering
Patent trolling
Plagiarism
Cybersquatting
Answer: Plagiarism
Question: Reverse engineering can only be applied to computer hardware, not computer software.
Answer Choices: False
True
Answer: False
Question: Because organizations can risk losing trade secrets when key employees leave, they often try to prohibit employees from revealing secrets by adding more-complete clauses to employment contracts.
Answer Choices: True
False
Answer: True
Question: Which of the following allows portions of copyrighted materials to be used without permission under certain circumstances?
Answer Choices: Copyright infringement
Plagiarism
Fair use doctrine
Use of prior art
Answer: Fair use doctrine
Question: One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is:
Answer Choices: trade secrets can become part of the prior art and be used to protect patents and copyrights
no royalties must be paid on trade secrets
there is no need to file an application or disclose a trade secret to gain protection
the time limitation for a trade secret is longer than for patents and copyrights
Answer: there is no need to file an application or disclose a trade secret to gain protection
Question: Under which act was the U.S. patent system changed from a “first-to-invent” to a “first-inventor-to-file” system?
Answer Choices: Leahy-Smith America Invents Act
Uniform Trade Secrets Act
Lanham Act
Economic Espionage Act
Answer: Leahy-Smith America Invents Act