Living In The IT Era (2 Quart) Flashcards

1
Q

It is a term used to describe works of the mind.

A

Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is a rights that creators have over their literary and artistic works.

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

use or production of copyright-protected
material without the permission of
the copyright holder.

A

Copyright Infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An act or instance of using or closely imitating the
language and thoughts of another author without
authorization.

A

Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An Idea cannot be __, But the __ of an Idea can be.

A

copyrighted, expression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__ defense against a claim of copyright infringement

A

Fair Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is the granting of a property right to an inventor

A

Patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Copyright grants creators the exclusive right to:

A
  • Display
  • Distribute
  • Perform
  • Reproduce Work
  • Prepare derivative works based upon the work
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The __ is a typographic symbol that
provides notice that the preceding word or symbol is a trademark or
service mark that has been registered

A

Registered Trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

business information generally unknown to the public, called?.

A

Trade Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A __ license is one of several public copyright
licenses that enable the free distribution of an otherwise copyrighted
“work”.

A

Creative Commons (CC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intellectual Property is the __ way to protect things.

A

Legal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anyone can use the R sign without registering.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Patents protect literary works

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

presenting someone else’s work or
ideas as your own, with or without their
consent, by incorporating it into your
work without full acknowledgement.

A

Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__ copying another person’s work word for word.

A

Direct Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

__ use of one’s own previous work in another context
without citing that it was used previously.

A

Self-Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

also known as patchwriting, it occurs when a
student borrows phrases from a source without using quotation marks, or
finds synonyms for the author’s language while keeping to the same
general structure and meaning of the original.

A

Mosaic Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

occurs when a person neglects to cite their
sources, or misquotes their sources, or unintentionally paraphrases a
source by using similar words, groups of words, and/or sentence
structure without attribution

A

Accidental Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

6 ways to avoid plagiarism.

A
  • Parapharse
  • Cite
  • Quote
  • Citing Quote
  • Citing your own material
  • Reference
21
Q

The Purpose of IP law is to?.

A

make sure
that people with good ideas can profit
from those ideas, even after the idea is
known to everyone.

22
Q

A __ defense against a claim of copyright
infringement

23
Q

Explain the Patent Toll Firm

A

Acquires patents with no intention of
manufacturing anything; instead, licensing
the patents to others

24
Q

a __ legally registered word, phrase, symbol, or other
item that identifies a particular product, service, or
corporation.

25
The key Intellectual Property Issue is?.
- Plagiarism - Reverse Engineering - Competitive Intelligence - Cybersquatting - Trademark Infringement
26
process of taking something ‘ apart in order to understand it, build a copy of it, or improve it
Reverse Engineering
27
legally obtained information that is gathered to help a company gain an advantage over its rivals.
Competitive Intelligence
28
registering, trafficking in, or using an Internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else
Cybersquatting
29
unauthorized use of a trademark or service mark on or in connection with goods and/or services in a manner that is likely to cause confusion, deception, or mistake about the source of the goods and/or services.
Trademark Infringement
30
Any information relating to, or traceable to, an individual person
Personal Information
31
process for getting permission before disclosing personal information.
Informed Consent
32
describes collection of personal information without the person’s knowledge.
Invisible Information Gathering
33
theft of key pieces of personal information to impersonate a person
Identity Theft
34
collection, preparation, review and production of electronically stored information for use in criminal and civil actions.
Electronic Discovery
35
What is Consumer Profiling?
Is the process of collecting and analyzing data about individuals to create a detailed understanding of their behaviors, preferences, and characteristics.
36
3 Key Aspects of Privacy
- Freedom from Intrusion - Control of Information about oneself - Freedom from surveillance
37
It is your right to control what happens with personal information about you.
Privacy
38
___ is the ability to communicate with others without those communications being monitored by other persons, or organizations
Communications Privacy
39
___ is the ability to limit access to one’s personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and its use.
Information Privacy
40
___ is the use of personal information for a purpose other than the one for which the person supplied it.
Secondary Use
41
___ means searching and analyzing masses of data to find patterns and develop new information or knowledge.
Data mining
42
This ___ means combining and comparing information from different databases, often using an identifier such as a person’s Social Security number or their computer’s Internet address to match records.
Matching
43
This _ means analyzing data to determine characteristics of people most likely to engage in certain behavior. Businesses use these techniques to find likely new customers.
Profiling
44
What is Opt-In/Opt-Out Policy?.
Opt-Out - one must check or click a box on a contract, membership form, or agreement or contact the organization to request that they not use one’s information in a particular way. Opt-In - the collector of the information may not use it for secondary uses unless the person explicitly checks or clicks a box or signs a form permitting the use.
45
___ are files a website stores on a visitor’s computer. Within the ___, the site stores and then uses the information about the visitor’s activity.
Cookies
46
An alarming number of identity theft incidents involve breaches of large databases to gain personal identity information.
Data Breach
47
___ is an attempt to steal personal identity data by tricking users into entering information on a counterfeit Web site.
Phising
48
___ is keystroke-logging software downloaded to users’ computers without the knowledge or consent of the user.
Spyware