Question 1 of 20
|
5.0 Points |
A person who gains unauthorized access to computers, either for mischief or with criminal intent, is called a(n):
|
A. imposter. |
|
|
B. fraud. |
|
|
C. genius. |
|
|
D. hacker. |
|
Reset Selection
|
Question 2 of 20
|
5.0 Points |
Instructions hidden in software with the potential to cause significant damage to both hardware and software is a:
|
A. virus. |
|
|
B. piracy. |
|
|
C. corruption. |
|
|
D. façade. |
|
Reset Selection
|
Question 3 of 20
|
5.0 Points |
The Electronic Communications Privacy Act (ECPA) states that individuals may not gain access without permission to a(n):
|
A. fund transfer system. |
|
|
B. cyberspace privacy system. |
|
|
C. electronic communication system. |
|
|
D. antiviral organization. |
|
Reset Selection
|
Question 4 of 20
|
5.0 Points |
The rapid advances in technology being experienced today make it difficult for people to maintain online anonymity or distance between themselves and powerful:
|
A. sales. |
|
|
B. interests. |
|
|
C. forces. |
|
|
D. departments. |
|
Reset Selection
|
Question 5 of 20
|
5.0 Points |
Online marketers of products and services have quickly recognized that learning about consumers’ online behavior presents a real opportunity to increase their:
|
A. sales. |
|
|
B. interests. |
|
|
C. forces. |
|
|
D. departments. |
|
Reset Selection
|
Question 6 of 20
|
5.0 Points |
Trademark registrations are issued at the federal level by the U.S. Patent and Trademark Office of the Department of:
|
A. Commerce. |
|
|
B. Labor. |
|
|
C. Justice. |
|
|
D. States. |
|
Reset Selection
|
Question 7 of 20
|
5.0 Points |
A trademark registration is issued for a renewable period of __________ years.
Reset Selection
|
Question 8 of 20
|
5.0 Points |
A distinctive, nonfunctional feature, which distinguishes a merchant’s or manufacturer’s goods or services from those of another, is known as a:
|
A. trademark. |
|
|
B. trade dress. |
|
|
C. design patent. |
|
|
D. copyright. |
|
Reset Selection
|
Question 9 of 20
|
5.0 Points |
Anyone who manufactures or sells, without permission, a product that has been patented by another can be charged with:
|
A. fraud. |
|
|
B. infringement. |
|
|
C. misrepresentation. |
|
|
D. breach of contract. |
|
Reset Selection
|
Question 10 of 20
|
5.0 Points |
The Patent and Trademark Office would probably grant a patent if the invention is a device, useful, novel, and:
|
A. unauthorized. |
|
|
B. obsolete. |
|
|
C. nonobvious. |
|
|
D. general. |
|
Reset Selection
|
Question 11 of 20
|
5.0 Points |
Design patents are granted for a period __________ years.
|
A. less than 20 |
|
|
B. from 20 to 30 |
|
|
C. from 30 to 40 |
|
|
D. from 40 to 50 |
|
Reset Selection
|
Question 12 of 20
|
5.0 Points |
A place where a corporation or an issuer sells its securities to the public is known as a __________ market.
|
A. commodity |
|
|
B. primary |
|
|
C. secondary |
|
|
D. labor |
|
Reset Selection
|
Question 13 of 20
|
5.0 Points |
Issuers of securities must register the securities with the:
|
A. U.S. Copyright Commission. |
|
|
B. U.S. Patent and Trademark Office. |
|
|
C. Securities and Exchange Commission. |
|
|
D. Federal Trade Commission. |
|
Reset Selection
|
Question 14 of 20
|
5.0 Points |
A document that provides relevant and important information about the company, its businesses, and its prospects is known as:
|
A. memorandum of association. |
|
|
B. articles of association. |
|
|
C. letters of incorporation. |
|
|
D. prospectus. |
|
Reset Selection
|
Question 15 of 20
|
5.0 Points |
In 1992, the SEC created a computerized system, known as the Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system that allows companies to:
|
A. download required information directly. |
|
|
B. sell its shares to the public online. |
|
|
C. make advertisements on the web. |
|
|
D. register with the Federal Trade Commission. |
|
Reset Selection
|
Question 16 of 20
|
5.0 Points |
A computer program is defined as a “set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain act” under the:
|
A. Global Computer Review Act of 2004. |
|
|
B. Computer Software Copyright Act of 1980. |
|
|
C. National Software Act of 1863. |
|
|
D. USA Computer Act of 2001. |
|
Reset Selection
|
Question 17 of 20
|
5.0 Points |
A(n) __________ test is used to determine whether an ordinary reasonable observer comparing two works would have to conclude that the work being questioned was copied from the other.
|
A. substantial similarity |
|
|
B. fair use |
|
|
C. goodwill |
|
|
D. infringement |
|
Reset Selection
|
Question 18 of 20
|
5.0 Points |
A form of personal property, which includes knowledge, ways of doing things, and expressions of ideas is known as a(n):
|
A. intellectual property. |
|
|
B. tangible property. |
|
|
C. real property. |
|
|
D. easementary right. |
|
Reset Selection
|
Question 19 of 20
|
5.0 Points |
Consumers who believe that their right to privacy is being violated by the embedding of software can complain to the:
|
A. Federal Tort Curbing Agency. |
|
|
B. Administration and Trade Commission. |
|
|
C. Agency against Unfair Trade Practices. |
|
|
D. Federal Trade Commission. |
|
Reset Selection
|
Question 20 of 20
|
5.0 Points |
The ECPA also grants an Internet service provider (ISP) the right to __________ e-mail messages without the subscriber’s consent.
|
A. monitor |
|
|
B. screen |
|
|
C. block |
|
|
D. redirect |
|
|