Living In The IT Era (2 Quart) Flashcards

1
Q

It is a term used to describe works of the mind.

A

Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is a rights that creators have over their literary and artistic works.

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

use or production of copyright-protected
material without the permission of
the copyright holder.

A

Copyright Infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An act or instance of using or closely imitating the
language and thoughts of another author without
authorization.

A

Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An Idea cannot be __, But the __ of an Idea can be.

A

copyrighted, expression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__ defense against a claim of copyright infringement

A

Fair Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is the granting of a property right to an inventor

A

Patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Copyright grants creators the exclusive right to:

A
  • Display
  • Distribute
  • Perform
  • Reproduce Work
  • Prepare derivative works based upon the work
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The __ is a typographic symbol that
provides notice that the preceding word or symbol is a trademark or
service mark that has been registered

A

Registered Trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

business information generally unknown to the public, called?.

A

Trade Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A __ license is one of several public copyright
licenses that enable the free distribution of an otherwise copyrighted
“work”.

A

Creative Commons (CC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intellectual Property is the __ way to protect things.

A

Legal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anyone can use the R sign without registering.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Patents protect literary works

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

presenting someone else’s work or
ideas as your own, with or without their
consent, by incorporating it into your
work without full acknowledgement.

A

Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__ copying another person’s work word for word.

A

Direct Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

__ use of one’s own previous work in another context
without citing that it was used previously.

A

Self-Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

also known as patchwriting, it occurs when a
student borrows phrases from a source without using quotation marks, or
finds synonyms for the author’s language while keeping to the same
general structure and meaning of the original.

A

Mosaic Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

occurs when a person neglects to cite their
sources, or misquotes their sources, or unintentionally paraphrases a
source by using similar words, groups of words, and/or sentence
structure without attribution

A

Accidental Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

6 ways to avoid plagiarism.

A
  • Parapharse
  • Cite
  • Quote
  • Citing Quote
  • Citing your own material
  • Reference
21
Q

The Purpose of IP law is to?.

A

make sure
that people with good ideas can profit
from those ideas, even after the idea is
known to everyone.

22
Q

A __ defense against a claim of copyright
infringement

A

Fair Use

23
Q

Explain the Patent Toll Firm

A

Acquires patents with no intention of
manufacturing anything; instead, licensing
the patents to others

24
Q

a __ legally registered word, phrase, symbol, or other
item that identifies a particular product, service, or
corporation.

A

Trademark

25
Q

The key Intellectual Property Issue is?.

A
  • Plagiarism
  • Reverse Engineering
  • Competitive Intelligence
  • Cybersquatting
  • Trademark Infringement
26
Q

process of taking something ‘ apart in order to understand it, build a copy of it, or improve it

A

Reverse Engineering

27
Q

legally obtained information that is gathered to help a company gain an advantage over its rivals.

A

Competitive Intelligence

28
Q

registering, trafficking in, or using an Internet
domain name with bad faith intent to profit from
the goodwill of a trademark belonging to
someone else

A

Cybersquatting

29
Q

unauthorized use of a trademark or
service mark on or in connection with
goods and/or services in a manner that is
likely to cause confusion, deception, or
mistake about the source of the goods
and/or services.

A

Trademark Infringement

30
Q

Any information relating to, or traceable to, an individual person

A

Personal Information

31
Q

process for getting permission before disclosing
personal information.

A

Informed Consent

32
Q

describes collection of personal information
without the person’s knowledge.

A

Invisible Information Gathering

33
Q

theft of key pieces of personal information to
impersonate a person

A

Identity Theft

34
Q

collection, preparation, review and production of
electronically stored information for use in criminal and
civil actions.

A

Electronic Discovery

35
Q

What is Consumer Profiling?

A

Is the process of collecting and analyzing data about individuals to create a detailed understanding of their behaviors, preferences, and characteristics.

36
Q

3 Key Aspects of Privacy

A
  • Freedom from Intrusion
  • Control of Information about oneself
  • Freedom from surveillance
37
Q

It is your right to control what happens with personal
information about you.

A

Privacy

38
Q

___ is the ability to communicate with others
without those communications being monitored by other persons, or
organizations

A

Communications Privacy

39
Q

___ is the ability to limit access to one’s personal data
by other individuals and organizations in order to exercise a
substantial degree of control over that data and its use.

A

Information Privacy

40
Q

___ is the use of personal information for a purpose other than the one
for which the person supplied it.

A

Secondary Use

41
Q

___ means searching and analyzing masses of data to find patterns and
develop new information or knowledge.

A

Data mining

42
Q

This ___ means combining and comparing information from different
databases, often using an identifier such as a person’s Social Security number or their
computer’s Internet address to match records.

A

Matching

43
Q

This _ means analyzing data to determine characteristics of people most likely to engage in certain behavior.
Businesses use these techniques to find likely new
customers.

A

Profiling

44
Q

What is Opt-In/Opt-Out Policy?.

A

Opt-Out - one must check or click a box on a contract, membership form, or agreement or contact the organization to request that they not use one’s information in
a particular way.

Opt-In - the collector of the information may not use it for secondary uses unless
the person explicitly checks or clicks a box or signs a form permitting the use.

45
Q

___ are files a website stores on a visitor’s computer. Within the ___, the site stores and then uses the information about the visitor’s activity.

A

Cookies

46
Q

An alarming number of identity
theft incidents involve breaches of large databases to gain personal identity
information.

A

Data Breach

47
Q

___ is an attempt to steal personal identity
data by tricking users into entering information on a counterfeit Web site.

A

Phising

48
Q

___ is keystroke-logging software downloaded to users’ computers
without the knowledge or consent of the user.

A

Spyware