Intellectual Prop Flashcards
What are the types of intellectual property?
(1) Industrial: patents, industrial designs, wordmarks, and trademarks
(2) Copyright: books, plays, manuscripts, drawings, paintings, TV, movies, music and multimedia!
How long does copyright last?(c sign)
In Canada copyright lasts for 50 years after the author/creator’s death.
■In the United States of America however, it gets a little complicated.
■The Sonny Bono Copyright Extension Act (SBCEA) states:
■If the copyright was created after 1977 then the copyright will last for 70 years after the creator’s death
■If the copyright was created before 1923 then it will become public domain.
■Anything that was copyrighted between 1923 and 1977, would last 95 years after the initial copyright.
■The SBCEA brought up the concept of Publishing Dates and widespread dissemination (uploading and publishing stuff on the internet, etc).
What is the difference between privacy and security?
(1) Privacy: relates to any rights you have over your personal information, as well as the right you have to be informed about how your information is used.
(2) Security: relates to the protection of your data, as well as your information systems. This includes protection from theft of or damage to hardware, software, and data, as well as protection from disruption or misdirection of digital services.
Who might exploit the vulnerabilities in security/ privacy?
Many different types of “threat actors”:
▪“Hackers”: people who are curious about systems for a variety of reasons.
▪Criminals: people with nefarious/illegal intent
▪Hacktivists: people with political / social / philosophical / religious messages they want to express.
▪Nation-state actors: government agencies (military, intelligence).
Briefly explain PIPEDA. ( related to privacy)
PIPEDA features 10 “fair information” principles for the collection, use and disclosure of personal information, as well as for providing access to personal information.
- Accountability
- Identifying Purposes
- Consent
- Limiting Collection
- Limiting Use, Disclosure, and Retention
- Accuracy
- Safeguards
- Openness
- Individual Access
- Challenging Compliance
What are the four components to a computer?
Input——processing and storage (separate) ——- output
Briefly explain top-down process.
First , begin with a single statement that describes the purpose/ function of the program.
Then,create a list of the basic steps involved in completing the function.
Divide these “top” statements into a series of smaller steps/tasks. This will be the first refinement
You can keep doing this until a refined and complete process is shown.
Lossy vs lossless data
Lossless compression: every single bit of data that was originally in the file remains after the file is uncompressed. All of the information is completely restored. This is generally the technique of choice for text or spreadsheet files, where losing words or financial data could pose a problem. The Graphics Interchange File (GIF) is an image format used on the Web that provides lossless compression.
Lossy compression: reduces a file by permanently eliminating certain information, especially redundant information. When the file is uncompressed, only a part of the original information is still there (although the user may not notice it). Lossy compression is generally used for video and sound, where a certain amount of information loss will not be detected by most users.
Describe how jpeg compression works.(brief)
lossy compression with following steps:
▫partition image into 8 by 8 picture blocks
▫work from left to right to perform the discrete cosine transform (DCT) on each block
▫quantize the DCT coefficients
▫entropy code the reduced coefficients
▫display the image by reconstructing it through decompression
Describe the characteristics of flow charts and how to make one.
Useful tool in program development ▪Not a complete description of program ▪Not only tool to use ▪Made before doing the work ▪End result(s) might differ from flowchart ▪Only executable statements are shown ▪Specific equations and tests not included ▪Every main and sub-task is charted
User centred design (UCD) : what are the nine steps?
Define the Context
- Describe the User
- Task Analysis
- Function Allocation
- System Layout / Basic Design
- Mockups & Prototypes
- Usability Testing
- Iterative Test & Redesignf
Describe the 4 steps of the concept stage.
Begin by defining the purpose of the site:
2.State the goals and objectives of the site
▫What is the site trying to accomplish?
▫Broad examples: Educate, entertain, shop…
3.State the audience of the site:
▫Who is it for?
▫Broad examples: chefs, doctors, teenagers…
4.State the scope of the site:
▫What pages and features will fulfill the goals?
Further define step 3 of the concept phase. (Audience definitions)
Every audience is different. It’s important to research the needs, wants, and preferences of those audiences so that the website can serve them better. Design teams often try to identify different audiences by: ▪Age ▪Gender ▪Geographic location ▪Residence: urban, suburban, rural ▪Level of income ▪Level of education ▪Interest: reason they came to the site Audience definitions should be present in the planning of a website, including its purpose statement. ▪Not present in previous ACME example.
Example:
Yahooligans: 8-12 year olds looking for information for school or personal research
Note: this example was included in the original course slides, but be careful of audience definitions like this! They risk perpetuating stereotypes and breaking the ACM’s code of ethics and professional.
Explain the navigation aspect of the design phase.
▪Always give user a sense of size and place
▫How big is the site?
▫Where is the user on the site?
▪Make the interface idiot-proof
▫User interface elements should be in prominent locations and labelled
▪Ensure consistent look-and-feel
Describe design phase: giving location feedback.
There are many ways to keep a visitor informed of where they are on a website, including: ▪Cross-navigation ▪Tabs ▪Color-coding ▪Breadcrumb trail ▪Process Steps