Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 1 6 11 16 21 26 31 2 7 12 17 22 27 32 3 8 13 18 23 28 33 4 9 14 19 24 29 34 5 10 15 20 25 30 35 16 – Intellectual Property Rights, Ethics, Health, Access.

Similar presentations


Presentation on theme: "1 1 6 11 16 21 26 31 2 7 12 17 22 27 32 3 8 13 18 23 28 33 4 9 14 19 24 29 34 5 10 15 20 25 30 35 16 – Intellectual Property Rights, Ethics, Health, Access."— Presentation transcript:

1 – Intellectual Property Rights, Ethics, Health, Access & Environment

2 To present someone else’s work as your own is plagiarism, which is both a violation of patent law and an unethical act. True or False 1

3 3 True To present someone else’s work as your own is plagiarism, which is both a violation of patent law and an unethical act. 1 (pg 640)

4 The three main types of intellectual property rights are copyrights, trademarks, and _____. a.warranties b. patents c. wills d. cyber rights 2

5 5 2 The three main types of intellectual property rights are copyrights, trademarks, and b patents. (pg 633)

6 Research has shown that having an academic honor code does not effectively reduce cheating. 3 True or False

7 7 3 Research has shown that having an academic honor code does not effectively reduce cheating. False (pg 646)

8 A(n) copyright is a word, phrase, symbol, or design (or a combination of these) that identifies and distinguishes one product or service from another. 4 Modified True or False

9 9 A(n) trademark is a word, phrase, symbol, or design (or a combination of these) that identifies and distinguishes one product or service from another. False 4 (pg 635)

10 _____ is a policy where manufacturers are responsible for the entire lifecycle of their products and packaging, including recycling. 5 a.Green Grid Alliance b. Energy Star Alliance c. Paperless Library d. Extended producer responsibility

11 11 d. Extended producer responsibility is a policy where manufacturers are responsible for the entire lifecycle of their products and packaging, including recycling. 5 (pg 669)

12 _____ is an example of assistive output devices. 6 a.One-handed keyboard b. Head-pointing system w/ puff switch c. Voice input system d. Screen reader software

13 13 d. Screen reader software is an example of assistive output devices.. 6 (pg )

14 The legal concept of limited use permits limited duplication and use of a portion of copyrighted material for certain purposes, such as criticism, commentary, new reporting, teaching, and research. 7 Modified True or False

15 15 The legal concept of fair use permits limited duplication and use of a portion of copyrighted material for certain purposes, such as criticism, commentary, new reporting, teaching, and research. 7 False (pg 634)

16 ________ are the legal rights to which creators of intellectual property – original creative works – are entitled. 8 Completion

17 17 8 (pg 633) Intellectual property rights are the legal rights to which creators of intellectual property – original creative works – are entitled.

18 A(n) _____ is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, etc. 9 a.trademark b. copyright c. patent d. Intellectual ownership right

19 19 9 A(n) b. copyright is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, etc. (pg 634)

20 Digital copy is a new option for taking your legally purchased movies with you on your computer or portable digital media player. 10 Modified True or False

21 21 10 True Digital copy is a new option for taking your legally purchased movies with you on your computer or portable digital media player. (pg 643)

22 A _____ protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years. 11 a.trademark b. watermark c. patent d. copyright

23 A c. patent protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years. 11 (pg 637)

24 A _____ is a policy, often for a school or business, that specifies allowable use of resources such as computers and other equipment. 12 a.code of security b. code of conduct c. privacy policy d. piracy policy

25 25 12 A b. code of conduct is a policy, often for a school or business, that specifies allowable use of resources such as computers and other equipment. (pg 645)

26 The term ______ refers to standards of moral conduct. 13 Completion

27 27 The term ethics refers to standards of moral conduct. 13 (pg 638)

28 Currently, the most common form of computer / Internet addictive behavior is ing. 14 Modified True or False

29 29 14 Currently, the most common form of computer / Internet addictive behavior is Internet sex addiction to chat rooms and online pornography. False (pg 660)

30 A trademark used to identify a service is also called a(n) _____. 15 Completion

31 31 15 A trademark used to identify a service is also called a(n) service mark. Completion (pg 635)

32 16 Completion The practice of providing false information in an attempt to look more qualified for a job, sometimes referred to as ______, is both dishonest and unethical.

33 33 16 Completion The practice of providing false information in an attempt to look more qualified for a job, sometimes referred to as resume padding, is both dishonest and unethical. (pg 646)

34 17 A ____ is a subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder. a.digital patent b. digital trademark c. digital watermark d. digital copyright

35 35 17 A c. digital watermark is a subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder. (pg 634)

36 18 Acquiring a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as _____. a.Cyber-invasion b. cyber-intrusion c. digital invasion d. cybersquatting

37 37 18 Acquiring a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as d. cybersquatting. (pg 636)

38 Completion 19 __________ are the standards of conduct that guide a business’s policies, decisions, and actions.

39 39 19 Business ethics are the standards of conduct that guide a business’s policies, decisions, and actions. Completion (pg 640)

40 20 In addition to being a copyright concern, ____ can be used to misquote individuals, repeat comments out of context, retouch photographs – even create false or misleading photographs. a.digital counterfeiting b. identity theft c. plagiarism d. digital manipulation

41 41 In addition to being a copyright concern, d digital manipulation can be used to misquote individuals, repeat comments out of context, retouch photographs – even create false or misleading photographs. 20 (pg 647)

42 The ongoing battle to stay current with changing technology creates stress for many individuals. 21 True or False

43 43 The ongoing battle to stay current with changing technology creates stress for many individuals. 21 True (pg 658)

44 Requiring proof of age at delivery is required by law in some states for certain types of shipments. 22 True or False

45 45 (pg 650) Requiring proof of age at delivery is required by law in some states for certain types of shipments. 22 True

46 23 In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require ____ to personally vouch for the truth and fairness of their company’s disclosures. a.CEOs and CIOs b. CEOs and CFOs c. SOAs and DRMs d. CCVs and DRMs

47 47 23 In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require b. CEOs and CFOs to personally vouch for the truth and fairness of their company’s disclosures. (pg 649)

48 Completion 24 A student copying and pasting information from various online documents to create his/her research paper without crediting the original authors is considered to be committing ________

49 49 24 Completion A student copying and pasting information from various online documents to create his/her research paper without crediting the original authors is considered to be committing plagiarism. (pg 640)

50 To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of __________. 25 a. DRM b. AACSB c. patents d. RSI

51 51 25 To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of a. DRM (Digital Rights Management) (pg 642)

52 All computer users should refocus their eyes on an object in the distance for a minute or so, on a regular basis. 26 True or False

53 53 All computer users should refocus their eyes on an object in the distance for a minute or so, on a regular basis. True 26 (pg 657)

54 27 Early signs of CTS (carpal tunnel syndrome) include a feeling of emotional and physical exhaustion. Modified True or False

55 55 27 Early signs of burnout include a feeling of emotional and physical exhaustion. False (pg 660)

56 28 The term e-computing refers to the use of computers in an environmentally friendly manner. Modified True or False

57 57 The term green computing refers to the use of computers in an environmentally friendly manner. False 28 (pg 666)

58 29 Repetitive stress injuries and other injuries related to the workplace environment account for one-half of all serious workplace injuries. True or False

59 59 29 False Repetitive stress injuries and other injuries related to the workplace environment account for one-third of all serious workplace injuries. (pg 652)

60 The term _____ refers to the gap between those who have access to information and communications technology and those who do not. 30 Multiple Choice a. digital have nots b. digital divide c. Internet divide d. bit divide

61 61 30 The term b. digital divide refers to the gap between those who have access to information and communications technology and those who do not. Multiple Choice (pg 661)

62 Expired toner cartridges and ink cartridges can sometimes be returned to the manufacturer or exchanged when ordering new ones, the cartridges are then ____ and resold. 31 Multiple Choice a. reprogrammed b. refurbished c. recharged d. recycled

63 63 31 Expired toner cartridges and ink cartridges can sometimes be returned to the manufacturer or exchanged when ordering new ones, the cartridges are then c. recharged and resold. Multiple Choice (pg 669)

64 32 Although registration is not required for copyright protection, it does offer an advantage if the need to prove ownership of a copyright arises, such as during a copyright-infringement lawsuit. True or False

65 65 32 Although registration is not required for copyright protection, it does offer an advantage if the need to prove ownership of a copyright arises, such as during a copyright-infringement lawsuit. True (pg 634)

66 33 The MPAA recently began pursuing civil litigation against movie pirates. True or False

67 67 33 True The MPAA recently began pursuing civil litigation against movie pirates. (pg 643)

68 34 For CTS, the most common symptoms are eyestrain or eye fatigue, dry eyes, burning eyes, light sensitivity, blurred vision, headaches, and pain in the shoulders, neck, or back. Modified True or False

69 69 34 False For CVS (Computer vision Syndrome), the most common symptoms are eyestrain or eye fatigue, dry eyes, burning eyes, light sensitivity, blurred vision, headaches, and pain in the shoulders, neck, or back. (pg )

70 35 To help identify and prosecute a “cammer,” most movie studios not embed invisible ____ in each print released to a theater. Completion

71 71 35 Completion To help identify and prosecute a “cammer,” most movie studios not embed invisible digital watermarks in each print released to a theater. (pg 642)


Download ppt "1 1 6 11 16 21 26 31 2 7 12 17 22 27 32 3 8 13 18 23 28 33 4 9 14 19 24 29 34 5 10 15 20 25 30 35 16 – Intellectual Property Rights, Ethics, Health, Access."

Similar presentations


Ads by Google