Chapter 6 Flashcards

1
Q

protect individuals online from predation.

A

Computer Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names, and images used in commerce.

A

Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 main types of Intellectual Property:

A

*Patents
*Trademarks
*Copyrights
*Trade Secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Used to protect inventive ideas or processes. It is what most often come to mind when thinking of IP protection.

A

Patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

are used to protect newly engineered plant species or strains

A

Patents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Patents result from the following stages:

A

*conceptualization
*Invention Disclosure
*Patent Application
*Maintenance
*cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is the overarching name for activities that include management of paperwork and meeting filing deadlines specified by the government patent office.

A

Docketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

it protects words, phrases, symbols, sounds, smells, and color schemes. Often considered assets that describe or otherwise identify the source of underlying products or services that a company provides.

A

Trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

do not protect ideas, but rather the manner in which ideas are expressed. “original works of authorship”

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

allow the owner of the protected materials to control reproduction, performance, new versioning or adaptation of works.

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

are proprietary procedures, systems, formulas, strategies, or other information that is confidential and exclusive to the company using them.

A

Trade Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It means respecting other users’ views and displaying common courtesy when posting your views to online discussion groups.

A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

refers to the instruction, communication with, storing data, in retrieving data from, or otherwise making use of any resources of a computer system.

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

refers to the modification or change, in form or substance, of an existing computer data or program.

A

Alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

refers to the transmission of information through ICT media, including voice, video, and other forms of data.

A

Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

refers to an electronic, magnetic, optical, electrochemical, or other data processing or communication device.

A

Computer

17
Q

refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system.

A

Computer Data

18
Q

refers to a set of instructions executed by the computer to achieve intended results.

A

Computer Program

19
Q

refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data.

A

Computer System

20
Q

refers to a computer or a computer network, the electronic medium in which online communication takes place.

A

Cyber

21
Q

refers to the collection of tools, policies, risk management approaches, actions, training used to protect the cyber environment

A

Cybersecurity

22
Q

refers to a presentation of information, knowledge, facts, concepts, or instructions which are processed and are intended for use in a computer system.

A

Database

23
Q

refers to listening to, recording, monitoring or surveillance of the content of communications.

A

Interception

24
Q

refers to any information contained in the form of computer data or any other form that is held by a service provider.

A

Subscriber’s Information

25
Q

the access to the whole or any part of a computer system without right.

A

illegal Access

26
Q

the interception made by technical means without right of any non-public transmission.

A

Illegal Interception

27
Q

the intentional or reckless alteration, damaging, deletion, or deterioration of computer data.

A

Data Interference

28
Q

the intentional alteration or reckless hindering or interference with the functioning of a computer or computer network.

A

System Interference

29
Q

the acquisition of a domain name over the internet in bad faith to profit.

A

Cybersquatting

30
Q

the willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organ or sexual activity.

A

Cybersex