Presentation is loading. Please wait.

Presentation is loading. Please wait.

Eleanor M. Savko 16 – Intellectual Property Rights, Ethics, Health, Access & Environment 4/8/2017 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21.

Similar presentations


Presentation on theme: "Eleanor M. Savko 16 – Intellectual Property Rights, Ethics, Health, Access & Environment 4/8/2017 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21."— Presentation transcript:

1 Eleanor M. Savko 16 – Intellectual Property Rights, Ethics, Health, Access & Environment 4/8/2017 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

2 True or False 1 To present someone else’s work as your own is plagiarism, which is both a violation of patent law and an unethical act.

3 True 1 To present someone else’s work as your own is plagiarism, which is both a violation of patent law and an unethical act. (pg 640)

4 2 The three main types of intellectual property rights are copyrights, trademarks, and _____. warranties b. patents c. wills d. cyber rights

5 2 The three main types of intellectual property rights are copyrights, trademarks, and b patents. (pg 633)

6 True or False 3 Research has shown that having an academic honor code does not effectively reduce cheating.

7 3 False Research has shown that having an academic honor code does not effectively reduce cheating. (pg 646)

8 Modified True or False 4 A(n) copyright is a word, phrase, symbol, or design (or a combination of these) that identifies and distinguishes one product or service from another.

9 False 4 A(n) trademark is a word, phrase, symbol, or design (or a combination of these) that identifies and distinguishes one product or service from another. (pg 635)

10 5 _____ is a policy where manufacturers are responsible for the entire lifecycle of their products and packaging, including recycling. Green Grid Alliance b. Energy Star Alliance c. Paperless Library d. Extended producer responsibility

11 5 d. Extended producer responsibility is a policy where manufacturers are responsible for the entire lifecycle of their products and packaging, including recycling. (pg 669)

12 _____ is an example of assistive output devices.
6 _____ is an example of assistive output devices. One-handed keyboard b. Head-pointing system w/ puff switch c. Voice input system d. Screen reader software

13 d. Screen reader software is an example of assistive output devices..
6 d. Screen reader software is an example of assistive output devices.. (pg )

14 Modified True or False 7 The legal concept of limited use permits limited duplication and use of a portion of copyrighted material for certain purposes, such as criticism, commentary, new reporting, teaching, and research.

15 False 7 The legal concept of fair use permits limited duplication and use of a portion of copyrighted material for certain purposes, such as criticism, commentary, new reporting, teaching, and research. (pg 634)

16 Completion 8 ________ are the legal rights to which creators of intellectual property – original creative works – are entitled.

17 8 Intellectual property rights are the legal rights to which creators of intellectual property – original creative works – are entitled. (pg 633)

18 9 A(n) _____ is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, etc. trademark b. copyright c. patent d. Intellectual ownership right

19 9 A(n) b. copyright is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, etc. (pg 634)

20 Modified True or False 10 Digital copy is a new option for taking your legally purchased movies with you on your computer or portable digital media player.

21 True 10 Digital copy is a new option for taking your legally purchased movies with you on your computer or portable digital media player. (pg 643)

22 11 A _____ protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years. trademark b. watermark c. patent d. copyright

23 11 A c. patent protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years. (pg 637)

24 12 A _____ is a policy, often for a school or business, that specifies allowable use of resources such as computers and other equipment. code of security b. code of conduct c. privacy policy d. piracy policy

25 12 A b. code of conduct is a policy, often for a school or business, that specifies allowable use of resources such as computers and other equipment. (pg 645)

26 The term ______ refers to standards of moral conduct.
Completion 13 The term ______ refers to standards of moral conduct.

27 The term ethics refers to standards of moral conduct.
13 The term ethics refers to standards of moral conduct. (pg 638)

28 Modified True or False 14 Currently, the most common form of computer / Internet addictive behavior is ing.

29 False 14 Currently, the most common form of computer / Internet addictive behavior is Internet sex addiction to chat rooms and online pornography. (pg 660)

30 A trademark used to identify a service is also called a(n) _____.
Completion 15 A trademark used to identify a service is also called a(n) _____.

31 A trademark used to identify a service is also called a(n)
Completion 15 A trademark used to identify a service is also called a(n) service mark. (pg 635)

32 Completion 16 The practice of providing false information in an attempt to look more qualified for a job, sometimes referred to as ______, is both dishonest and unethical.

33 Completion 16 The practice of providing false information in an attempt to look more qualified for a job, sometimes referred to as resume padding, is both dishonest and unethical. (pg 646)

34 17 A ____ is a subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder. digital patent b. digital trademark c. digital watermark d. digital copyright

35 17 A c. digital watermark is a subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder. (pg 634)

36 18 Acquiring a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as _____. Cyber-invasion b. cyber-intrusion c. digital invasion d. cybersquatting

37 18 Acquiring a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as d. cybersquatting. (pg 636)

38 Completion 19 __________ are the standards of conduct that guide a business’s policies, decisions, and actions.

39 Completion 19 Business ethics are the standards of conduct that guide a business’s policies, decisions, and actions. (pg 640)

40 20 In addition to being a copyright concern, ____ can be used to misquote individuals, repeat comments out of context, retouch photographs – even create false or misleading photographs. digital counterfeiting b. identity theft c. plagiarism d. digital manipulation

41 20 In addition to being a copyright concern, d digital manipulation can be used to misquote individuals, repeat comments out of context, retouch photographs – even create false or misleading photographs. (pg 647)

42 True or False 21 The ongoing battle to stay current with changing technology creates stress for many individuals.

43 True 21 The ongoing battle to stay current with changing technology creates stress for many individuals. (pg 658)

44 True or False 22 Requiring proof of age at delivery is required by law in some states for certain types of shipments.

45 True 22 Requiring proof of age at delivery is required by law in some states for certain types of shipments. (pg 650)

46 23 In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require ____ to personally vouch for the truth and fairness of their company’s disclosures. CEOs and CIOs b. CEOs and CFOs c. SOAs and DRMs d. CCVs and DRMs

47 23 In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require b. CEOs and CFOs to personally vouch for the truth and fairness of their company’s disclosures. (pg 649)

48 Completion 24 A student copying and pasting information from various online documents to create his/her research paper without crediting the original authors is considered to be committing ________

49 Completion 24 A student copying and pasting information from various online documents to create his/her research paper without crediting the original authors is considered to be committing plagiarism. (pg 640)

50 25 To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of __________. a. DRM b. AACSB c. patents d. RSI

51 25 To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of a. DRM (Digital Rights Management) (pg 642)

52 True or False 26 All computer users should refocus their eyes on an object in the distance for a minute or so, on a regular basis.

53 True 26 All computer users should refocus their eyes on an object in the distance for a minute or so, on a regular basis. (pg 657)

54 Modified True or False 27 Early signs of CTS (carpal tunnel syndrome) include a feeling of emotional and physical exhaustion.

55 False 27 Early signs of burnout include a feeling of emotional and physical exhaustion. (pg 660)

56 Modified True or False 28 The term e-computing refers to the use of computers in an environmentally friendly manner.

57 False 28 The term green computing refers to the use of computers in an environmentally friendly manner. (pg 666)

58 True or False 29 Repetitive stress injuries and other injuries related to the workplace environment account for one-half of all serious workplace injuries.

59 False 29 Repetitive stress injuries and other injuries related to the workplace environment account for one-third of all serious workplace injuries. (pg 652)

60 Multiple Choice 30 The term _____ refers to the gap between those who have access to information and communications technology and those who do not. a. digital have nots b. digital divide c. Internet divide d. bit divide

61 Multiple Choice 30 The term b. digital divide refers to the gap between those who have access to information and communications technology and those who do not. (pg 661)

62 Multiple Choice 31 Expired toner cartridges and ink cartridges can sometimes be returned to the manufacturer or exchanged when ordering new ones, the cartridges are then ____ and resold. a. reprogrammed b. refurbished c. recharged d. recycled

63 Multiple Choice 31 Expired toner cartridges and ink cartridges can sometimes be returned to the manufacturer or exchanged when ordering new ones, the cartridges are then c. recharged and resold. (pg 669)

64 True or False 32 Although registration is not required for copyright protection, it does offer an advantage if the need to prove ownership of a copyright arises, such as during a copyright-infringement lawsuit.

65 True 32 Although registration is not required for copyright protection, it does offer an advantage if the need to prove ownership of a copyright arises, such as during a copyright-infringement lawsuit. (pg 634)

66 True or False 33 The MPAA recently began pursuing civil litigation against movie pirates.

67 True 33 The MPAA recently began pursuing civil litigation against movie pirates. (pg 643)

68 Modified True or False 34 For CTS, the most common symptoms are eyestrain or eye fatigue, dry eyes, burning eyes, light sensitivity, blurred vision, headaches, and pain in the shoulders, neck, or back.

69 False 34 For CVS (Computer vision Syndrome), the most common symptoms are eyestrain or eye fatigue, dry eyes, burning eyes, light sensitivity, blurred vision, headaches, and pain in the shoulders, neck, or back. (pg )

70 Completion 35 To help identify and prosecute a “cammer,” most movie studios not embed invisible ____ in each print released to a theater.

71 Completion 35 To help identify and prosecute a “cammer,” most movie studios not embed invisible digital watermarks in each print released to a theater. (pg 642)


Download ppt "Eleanor M. Savko 16 – Intellectual Property Rights, Ethics, Health, Access & Environment 4/8/2017 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21."

Similar presentations


Ads by Google