Question 1 of 205.0 PointsA person who gains unauthorized access to computers, either for mischief or with criminal intent, is called a(n):A. imposter. B. fraud. C. genius. D. hacker. Reset Selection |
Question 2 of 205.0 PointsInstructions hidden in software with the potential to cause significant damage to both hardware and software is a:A. virus. B. piracy. C. corruption. D. façade. Reset Selection |
Question 3 of 205.0 PointsThe Electronic Communications Privacy Act (ECPA) states that individuals may not gain access without permission to a(n):A. fund transfer system. B. cyberspace privacy system. C. electronic communication system. D. antiviral organization. Reset Selection |
Question 4 of 205.0 PointsThe rapid advances in technology being experienced today make it difficult for people to maintain online anonymity or distance between themselves and powerful:A. sales. B. interests. C. forces. D. departments. Reset Selection |
Question 5 of 205.0 PointsOnline marketers of products and services have quickly recognized that learning about consumers’ online behavior presents a real opportunity to increase their:A. sales. B. interests. C. forces. D. departments. Reset Selection |
Question 6 of 205.0 PointsTrademark registrations are issued at the federal level by the U.S. Patent and Trademark Office of the Department of:A. Commerce. B. Labor. C. Justice. D. States. Reset Selection |
Question 7 of 205.0 PointsA trademark registration is issued for a renewable period of __________ years.A. 10 B. 20 C. 50 D. 60 Reset Selection |
Question 8 of 205.0 PointsA distinctive, nonfunctional feature, which distinguishes a merchant’s or manufacturer’s goods or services from those of another, is known as a:A. trademark. B. trade dress. C. design patent. D. copyright. Reset Selection |
Question 9 of 205.0 PointsAnyone who manufactures or sells, without permission, a product that has been patented by another can be charged with:A. fraud. B. infringement. C. misrepresentation. D. breach of contract. Reset Selection |
Question 10 of 205.0 PointsThe Patent and Trademark Office would probably grant a patent if the invention is a device, useful, novel, and:A. unauthorized. B. obsolete. C. nonobvious. D. general. Reset Selection |
Question 11 of 205.0 PointsDesign patents are granted for a period __________ years.A. less than 20 B. from 20 to 30 C. from 30 to 40 D. from 40 to 50 Reset Selection |
Question 12 of 205.0 PointsA place where a corporation or an issuer sells its securities to the public is known as a __________ market.A. commodity B. primary C. secondary D. labor Reset Selection |
Question 13 of 205.0 PointsIssuers of securities must register the securities with the:A. U.S. Copyright Commission. B. U.S. Patent and Trademark Office. C. Securities and Exchange Commission. D. Federal Trade Commission. Reset Selection |
Question 14 of 205.0 PointsA document that provides relevant and important information about the company, its businesses, and its prospects is known as:A. memorandum of association. B. articles of association. C. letters of incorporation. D. prospectus. Reset Selection |
Question 15 of 205.0 PointsIn 1992, the SEC created a computerized system, known as the Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system that allows companies to:A. download required information directly. B. sell its shares to the public online. C. make advertisements on the web. D. register with the Federal Trade Commission. Reset Selection |
Question 16 of 205.0 PointsA computer program is defined as a “set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain act” under the:A. Global Computer Review Act of 2004. B. Computer Software Copyright Act of 1980. C. National Software Act of 1863. D. USA Computer Act of 2001. Reset Selection |
Question 17 of 205.0 PointsA(n) __________ test is used to determine whether an ordinary reasonable observer comparing two works would have to conclude that the work being questioned was copied from the other.A. substantial similarity B. fair use C. goodwill D. infringement Reset Selection |
Question 18 of 205.0 PointsA form of personal property, which includes knowledge, ways of doing things, and expressions of ideas is known as a(n):A. intellectual property. B. tangible property. C. real property. D. easementary right. Reset Selection |
Question 19 of 205.0 PointsConsumers who believe that their right to privacy is being violated by the embedding of software can complain to the:A. Federal Tort Curbing Agency. B. Administration and Trade Commission. C. Agency against Unfair Trade Practices. D. Federal Trade Commission. Reset Selection |
Question 20 of 205.0 PointsThe ECPA also grants an Internet service provider (ISP) the right to __________ e-mail messages without the subscriber’s consent.A. monitor B. screen C. block D. redirect Reset Selection |