Question 1 of 20 | 5.0 Points |
A person who gains unauthorized access to computers, either for mischief or with criminal intent, is called a(n): | A. imposter. | | | B. fraud. | | | C. genius. | | | D. hacker. | | Reset Selection |
Question 2 of 20 | 5.0 Points |
Instructions hidden in software with the potential to cause significant damage to both hardware and software is a: | A. virus. | | | B. piracy. | | | C. corruption. | | | D. façade. | | Reset Selection |
Question 3 of 20 | 5.0 Points |
The Electronic Communications Privacy Act (ECPA) states that individuals may not gain access without permission to a(n): | A. fund transfer system. | | | B. cyberspace privacy system. | | | C. electronic communication system. | | | D. antiviral organization. | | Reset Selection |
Question 4 of 20 | 5.0 Points |
The rapid advances in technology being experienced today make it difficult for people to maintain online anonymity or distance between themselves and powerful: | A. sales. | | | B. interests. | | | C. forces. | | | D. departments. | | Reset Selection |
Question 5 of 20 | 5.0 Points |
Online marketers of products and services have quickly recognized that learning about consumers' online behavior presents a real opportunity to increase their: | A. sales. | | | B. interests. | | | C. forces. | | | D. departments. | | Reset Selection |
Question 6 of 20 | 5.0 Points |
Trademark registrations are issued at the federal level by the U.S. Patent and Trademark Office of the Department of: | A. Commerce. | | | B. Labor. | | | C. Justice. | | | D. States. | | Reset Selection |
Question 7 of 20 | 5.0 Points |
A trademark registration is issued for a renewable period of __________ years. Reset Selection |
Question 8 of 20 | 5.0 Points |
A distinctive, nonfunctional feature, which distinguishes a merchant's or manufacturer's goods or services from those of another, is known as a: | A. trademark. | | | B. trade dress. | | | C. design patent. | | | D. copyright. | | Reset Selection |
Question 9 of 20 | 5.0 Points |
Anyone who manufactures or sells, without permission, a product that has been patented by another can be charged with: | A. fraud. | | | B. infringement. | | | C. misrepresentation. | | | D. breach of contract. | | Reset Selection |
Question 10 of 20 | 5.0 Points |
The Patent and Trademark Office would probably grant a patent if the invention is a device, useful, novel, and: | A. unauthorized. | | | B. obsolete. | | | C. nonobvious. | | | D. general. | | Reset Selection |
Question 11 of 20 | 5.0 Points |
Design patents are granted for a period __________ years. | A. less than 20 | | | B. from 20 to 30 | | | C. from 30 to 40 | | | D. from 40 to 50 | | Reset Selection |
Question 12 of 20 | 5.0 Points |
A place where a corporation or an issuer sells its securities to the public is known as a __________ market. | A. commodity | | | B. primary | | | C. secondary | | | D. labor | | Reset Selection |
Question 13 of 20 | 5.0 Points |
Issuers of securities must register the securities with the: | A. U.S. Copyright Commission. | | | B. U.S. Patent and Trademark Office. | | | C. Securities and Exchange Commission. | | | D. Federal Trade Commission. | | Reset Selection |
Question 14 of 20 | 5.0 Points |
A document that provides relevant and important information about the company, its businesses, and its prospects is known as: | A. memorandum of association. | | | B. articles of association. | | | C. letters of incorporation. | | | D. prospectus. | | Reset Selection |
Question 15 of 20 | 5.0 Points |
In 1992, the SEC created a computerized system, known as the Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system that allows companies to: | A. download required information directly. | | | B. sell its shares to the public online. | | | C. make advertisements on the web. | | | D. register with the Federal Trade Commission. | | Reset Selection |
Question 16 of 20 | 5.0 Points |
A computer program is defined as a "set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain act" under the: | A. Global Computer Review Act of 2004. | | | B. Computer Software Copyright Act of 1980. | | | C. National Software Act of 1863. | | | D. USA Computer Act of 2001. | | Reset Selection |
Question 17 of 20 | 5.0 Points |
A(n) __________ test is used to determine whether an ordinary reasonable observer comparing two works would have to conclude that the work being questioned was copied from the other. | A. substantial similarity | | | B. fair use | | | C. goodwill | | | D. infringement | | Reset Selection |
Question 18 of 20 | 5.0 Points |
A form of personal property, which includes knowledge, ways of doing things, and expressions of ideas is known as a(n): | A. intellectual property. | | | B. tangible property. | | | C. real property. | | | D. easementary right. | | Reset Selection |
Question 19 of 20 | 5.0 Points |
Consumers who believe that their right to privacy is being violated by the embedding of software can complain to the: | A. Federal Tort Curbing Agency. | | | B. Administration and Trade Commission. | | | C. Agency against Unfair Trade Practices. | | | D. Federal Trade Commission. | | Reset Selection |
Question 20 of 20 | 5.0 Points |
The ECPA also grants an Internet service provider (ISP) the right to __________ e-mail messages without the subscriber's consent. | A. monitor | | | B. screen | | | C. block | | | D. redirect | | Reset Selection |