














Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A series of multiple-choice questions and answers related to intellectual property and software engineering concepts. It covers topics such as patents, trademarks, copyrights, trade secrets, open source software, software quality, and safety-critical systems. The questions are designed to test understanding of key definitions, laws, and principles in these areas.
Typology: Exams
1 / 22
This page cannot be seen from the preview
Don't miss anything!
The fair use doctrine denies portions of patented materials to be used without permission under any circumstance. - ** VERIFIED ANSWERS ** ✔✔ False Which of the following claims as its invention some feature or process embodied in instructions executed by a computer? - ** VERIFIED ANSWERS ** ✔✔ Software Patent Which of the following increased trademark and copyright enforcement and substantially increased penalties for infringement? - ** VERIFIED ANSWERS ** ✔✔ Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act A patent is a grant of a property right issued by which entity? - ** VERIFIED ANSWERS ** ✔✔ USPTO Using reverse engineering, a developer can use the code of the current database programming language to recover the design of the information system application. - ** VERIFIED ANSWERS ** ✔✔ True Copyright and patent protection was established through which of the following? - ** VERIFIED ANSWERS ** ✔✔ U.S. Constitution Which of the following is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's? - ** VERIFIED ANSWERS ** ✔✔ Trademark Patent law protects which of the following? - ** VERIFIED ANSWERS ** ✔✔ Inventions The process of taking something apart in order to understand it, build a copy of it, or improve it is known as which of the following? - ** VERIFIED ANSWERS ** ✔✔ Reverse Enineering
Which of the following imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets? - ** VERIFIED ANSWERS ** ✔✔ The Economic Espionage Act (EEA) of 1996 The Lanham Act (also known as the Trademark Act) defines the use of a trademark, the process for obtaining a trademark, and the penalties associated with trademark infringement. - ** VERIFIED ANSWERS ** ✔✔ True One of the tests that an invention must pass to be eligible for a patent is which of the following? - ** VERIFIED ANSWERS ** ✔✔ it must be obvious to a person having ordinary skill in the same field A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators. - ** VERIFIED ANSWERS ** ✔✔ False Which of the following requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations? - ** VERIFIED ANSWERS ** ✔✔ TRIPS agreement The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media. - ** VERIFIED ANSWERS ** ✔✔ False A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential. - ** VERIFIED ANSWERS ** ✔✔ False The courts have ruled in favor of using reverse engineering to: - ** VERIFIED ANSWERS ** ✔✔ enable interoperability Industrial espionage and competitive intelligence are essentially the same. - ** VERIFIED ANSWERS ** ✔✔ False Under which act was the U.S. patent system changed from a "first-to-invent" to a "first-inventor-to- file" system? - ** VERIFIED ANSWERS ** ✔✔ Leahy-Smith America Invents Act
Which of the following allows portions of copyrighted materials to be used without permission under certain circumstances? - ** VERIFIED ANSWERS ** ✔✔ Fair use doctrine Which of the following established the minimum levels of protection that each country must provide to all WTO members? - ** VERIFIED ANSWERS ** ✔✔ Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) Unlike traditional copyright law, which of the following acts does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use? - ** VERIFIED ANSWERS ** ✔✔ Digital Millennium Copyright Act (DMCA) How many classes of items did the U.S. Supreme Court rule could not be patented? - ** VERIFIED ANSWERS ** ✔✔ Three Which act was drafted in the 1970s to bring uniformity to all the United States in the area of trade secret law? - ** VERIFIED ANSWERS ** ✔✔ Uniform trade secrets act (UTSA) Which act allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts? - ** VERIFIED ANSWERS ** ✔✔ ACPA Open source code is any program whose source code is made available for use or modification, as users or other developers see fit. - ** VERIFIED ANSWERS ** ✔✔ True Defining and controlling the appropriate level of access to intellectual property are complex tasks. - ** VERIFIED ANSWERS ** ✔✔ True One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is: - ** VERIFIED ANSWERS ** ✔✔ there is no need to file an application or disclose a trade secret to gain protection The redistribution of a program code with no copyright as a proprietary software can be avoided by using which of the following? - ** VERIFIED ANSWERS ** ✔✔ Open Source License
What is the name of the agreement that prohibits a departing employee from working for any competitors for a period of time? - ** VERIFIED ANSWERS ** ✔✔ Noncompete Agreement Two software manufacturers could conceivably develop separate programs that perform the same functions in a nearly identical manner without infringing each other's copyrights. - ** VERIFIED ANSWERS ** ✔✔ True A common use of open source software is to move data from one application to another and to extract, transform, and load business data into large databases. - ** VERIFIED ANSWERS ** ✔✔ True Legally obtained information that is gathered to help a company gain an advantage over its rivals is called which of the following? - ** VERIFIED ANSWERS ** ✔✔ Competitive Intelligence Process-control computers enable the process to be monitored for variations from operating standards and to eliminate product defects before they affect which of the following? - ** VERIFIED ANSWERS ** ✔✔ Quality When sued for which of the following, a software supplier is not held responsible for every product defect that causes customer or third-party loss? - ** VERIFIED ANSWERS ** ✔✔ Negligence An airline's online ticket-reservation system and an electronic funds transfer system that moves money among banks, are examples of which of the following? - ** VERIFIED ANSWERS ** ✔✔ Order- Processing systems In which of the following is a defendant held responsible for injuring another person, regardless of negligence or intent? - ** VERIFIED ANSWERS ** ✔✔ Strict Liability Which of the following is true of software testing? - ** VERIFIED ANSWERS ** ✔✔ Static testing involves software programs called static analyzers which are run against new code. From 2007 to June 2016, the percentage of organizations determined to be at a high-maturity level is
Transference is the provision of multiple interchangeable components to perform a single function in order to cope with failures and errors. - ** VERIFIED ANSWERS ** ✔✔ False Software quality is the degree to which a software product meets the needs of its users. - ** VERIFIED ANSWERS ** ✔✔ True Which of the following terms is defined as the potential of gaining or losing something of value? - ** VERIFIED ANSWERS ** ✔✔ Risk A successful defense against a product liability case is typically expensive in terms of legal fees. - ** VERIFIED ANSWERS ** ✔✔ True Software developers do not typically work closely with safety and software engineers. - ** VERIFIED ANSWERS ** ✔✔ False Capability Maturity Model Integration (CMMI) is a process improvement approach that defines the essential elements of effective process. - ** VERIFIED ANSWERS ** ✔✔ True When developing safety-critical systems, a key assumption must be that safety will automatically result from following an organization's standard development methodology. - ** VERIFIED ANSWERS ** ✔✔ False Risk is the potential of gaining or losing something of value. - ** VERIFIED ANSWERS ** ✔✔ True In the context of Capability Maturity Model of Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in which of the following maturity levels? - ** VERIFIED ANSWERS ** ✔✔ Initial What type of programming is commonly found in airplane and spacecraft control systems? - ** VERIFIED ANSWERS ** ✔✔ Triple Version programming Which of the following is true of strategies for engineering quality software? - ** VERIFIED ANSWERS ** ✔✔ The first release of any software rarely meets all its users' expectations
A primary cause of poor software quality is that developers do not know how to design quality into software from the very start, or do not take the time to do so. - ** VERIFIED ANSWERS ** ✔✔ True There is no federal product liability law. - ** VERIFIED ANSWERS ** ✔✔ True A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in which type of file servers? - ** VERIFIED ANSWERS ** ✔✔ high-volume data storage User acceptance testing is performed by trained end users to ensure that the system operates as they expect. - ** VERIFIED ANSWERS ** ✔✔ True Which of the following is true of the International Organization for Standardization? - ** VERIFIED ANSWERS ** ✔✔ It is a worldwide federation of national standards bodies from 161 countries In an attempt to limit their liability in the event of nonperformance, software suppliers frequently write which of the following? - ** VERIFIED ANSWERS ** ✔✔ Warranties Software product liability claims are typically based on strict liability, negligence, breach of warranty, or misrepresentation. - ** VERIFIED ANSWERS ** ✔✔ True A failure mode describes how a product or process could fail to perform the desired functions described by the customer. - ** VERIFIED ANSWERS ** ✔✔ True Risk mitigation involves the reduction in either the likelihood or the impact of the occurrence of a risk.
Advances in which of the following areas are fundamentally changing the way work gets done and have the potential to affect the tasks, roles, and responsibilities of most workers? - ** VERIFIED ANSWERS ** ✔✔ Artificial Intelligence A measure of economic performance that compares the amount of goods and services produced (output) with the number of labor hours used in producing those goods and services is known as which of the following? - ** VERIFIED ANSWERS ** ✔✔ Labor Productivity It is difficult to quantify how much the use of IT has contributed to worker productivity because: - ** VERIFIED ANSWERS ** ✔✔ many other factors influence worker productivity rates besides IT Which of the following is NOT one of the three major components of machine learning systems? - ** VERIFIED ANSWERS ** ✔✔ A Function Electronic medical records capture data on the total health of the patient and include more than just the standard clinical data collected in the provider's office thus enabling a broader view of a patient's care. - ** VERIFIED ANSWERS ** ✔✔ False Almost every job has partial automation potential, and research suggests what percentage of human work activities could be automated using existing technology? - ** VERIFIED ANSWERS ** ✔✔ 45% A comprehensive view of the patient's complete medical history designed to be shared with authorized providers and staff from more than one organization is known as which of the following? - ** VERIFIED ANSWERS ** ✔✔ EHR Which of the following involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation? - ** VERIFIED ANSWERS ** ✔✔ Store-and-forward telemedicine Effective use of CDS systems increases the quality of patient care but at the expense of rising healthcare costs. - ** VERIFIED ANSWERS ** ✔✔ False Remote monitoring is also known as which of the following? - ** VERIFIED ANSWERS ** ✔✔ Home Monitoring
Lifestyle changes have led to a decrease in chronic illnesses, such as diabetes and heart disease, that are expensive and difficult to treat. - ** VERIFIED ANSWERS ** ✔✔ False Which of the following requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites? - ** VERIFIED ANSWERS ** ✔✔ Live Telemedicine Labor productivity is measured by the annual revenue an employee generates divided by the employee's annual salary. - ** VERIFIED ANSWERS ** ✔✔ False Natural language processing is an aspect of artificial intelligence that involves technology that allows computers to understand, analyze, manipulate, and/or generate "natural" languages, such as English.
Which of the following involves the regular, ongoing, accurate measurement of an individual's vital signs and other health measures and the transmission of this data to a healthcare provider? - ** VERIFIED ANSWERS ** ✔✔ Remote Monitoring Which of the following helps physicians keep tabs on patients prone to life-threatening health crises? - ** VERIFIED ANSWERS ** ✔✔ Remote Monitoring What is another name for a tethered PHR? - ** VERIFIED ANSWERS ** ✔✔ Patient Portal The development and use of new medical technology, such as new diagnostic procedures and treatments, also contributes to the increase in healthcare spending per person. - ** VERIFIED ANSWERS ** ✔✔ True Since businesses implemented automated payroll systems, fewer accounting employees are needed. - ** VERIFIED ANSWERS ** ✔✔ Trye Lifestyle changes have led to a decrease in chronic illnesses, such as diabetes heart disease, that are expensive and difficult to treat. - ** VERIFIED ANSWERS ** ✔✔ False Researchers have found that it can take how long for IT investment to result in a significant increase in productivity? - ** VERIFIED ANSWERS ** ✔✔ Five to Seven Years A computerized provider order entry (CPOE) system enables physicians to place orders for drugs, laboratory tests, radiology, physical therapy) electronically, with the orders transmitted directly to the recipient. - ** VERIFIED ANSWERS ** ✔✔ True More advanced artificial-intelligence-based clinical decision support systems can doctors choose the proper dosage levels of medication based on a patient's most recent tests results. - ** VERIFIED ANSWERS ** ✔✔ True The National Center for Victims of Crime advises victims to: - ** VERIFIED ANSWERS ** ✔✔ send the stalker a written notice that their contact is unwanted and that further contact should cease
Which social media platform provides filters that alter the user's face by smoothing and whitening skin, changing eye shape, nose size, and jaw profile? - ** VERIFIED ANSWERS ** ✔✔ Snapchat Abusive behavior, which involves the use of an electronic communications device, that is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress is known as which of the following? - ** VERIFIED ANSWERS ** ✔✔ Cyberharrasment A social networking platform: - ** VERIFIED ANSWERS ** ✔✔ Can be used for business purposes Which of the following typically involves the use of social networks to communicate and promote the benefits of products and services? - ** VERIFIED ANSWERS ** ✔✔ Social Media Marketing The number of Internet users worldwide is quickly approaching which of the following? - ** VERIFIED ANSWERS ** ✔✔ 4 Billion Social shopping Web sites earn money solely by sharing with retailers data about their members' likes and dislikes. - ** VERIFIED ANSWERS ** ✔✔ False The goal of the Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Act is to provide law enforcement and citizens with the location of all sex offenders in the community.
Cyberharassment is a form of cyberabuse in which the abusive behavior, which involves the use of an electronic communications device, is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress. - ** VERIFIED ANSWERS ** ✔✔ True Organizations can use which of the following to capture interviews with customers, managers, and industry leaders? - ** VERIFIED ANSWERS ** ✔✔ Google Hangouts On Air Cyberstalking can escalate into physical stalking and even physical assault. - ** VERIFIED ANSWERS ** ✔✔ True Which of the following is currently the most popular social network destination worldwide? - ** VERIFIED ANSWERS ** ✔✔ Facebook Which of the following is currently the world's largest professional network? - ** VERIFIED ANSWERS ** ✔✔ LinkedIn The two primary objectives of social media advertisers are driving traffic to a Web site to increase product sales and which of the following? - ** VERIFIED ANSWERS ** ✔✔ Raise Brand Awareness Some 18 percent of private employers surveyed say they have dismissed employees because of something they posted on social media. - ** VERIFIED ANSWERS ** ✔✔ True Studies found that driving while talking on your phone doubles your risk of an accident to about the same level as if you were driving drunk. - ** VERIFIED ANSWERS ** ✔✔ False Twitter enables an organization to share short text updates, images, links, polls, and videos. - ** VERIFIED ANSWERS ** ✔✔ True For a sex offender who is at Tier 2 of the Adam Walsh Act, how long do they need to remain registered. - ** VERIFIED ANSWERS ** ✔✔ 25 Years
As of March 2017, how many states had implemented the SORNA requirements of the Adam Walsh Act? - ** VERIFIED ANSWERS ** ✔✔ 17 Social media platforms also enable a degree of self-image manipulation. - ** VERIFIED ANSWERS ** ✔✔ True Organic media marketing involves the use of social networks to communicate and promote the benefits of products and services. - ** VERIFIED ANSWERS ** ✔✔ False Currently, there is a fairly narrow range of social networking Web sites catering to interests of Internet users represented online. - ** VERIFIED ANSWERS ** ✔✔ False Which of the following social network platforms enables users to visually share and discover new interests by posting images or videos to their own or others' boards? - ** VERIFIED ANSWERS ** ✔✔ Pinterest What steps does Facebook plan to take in order to identify and prevent the posting of inappropriate images in Facebook, Messenger, and Instagram? - ** VERIFIED ANSWERS ** ✔✔ employ artificial intelligence and image recognition Approximately how much material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting? - ** VERIFIED ANSWERS ** ✔✔ 400 Hours Which of the following employs tools provided by or tailored for a particular social media platform to build a social community and interact with it by sharing posts and responding to customer comments on the organization's blog and social media accounts? - ** VERIFIED ANSWERS ** ✔✔ Organic Media Marketing Which federal law protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity? - ** VERIFIED ANSWERS ** ✔✔ 18 USC 2425 Global Market Research company J.D. Power claims that how many consumers have used a company's social media channel for customer service? - ** VERIFIED ANSWERS ** ✔✔ 2/
China is considered one of the best sources of programming skills outside Europe and North America. - ** VERIFIED ANSWERS ** ✔✔ False A disadvantage of using contingent workers is that they: - ** VERIFIED ANSWERS ** ✔✔ may pass on information about corporate processes and strategies to subsequent clients who could be competitors One potential disadvantage of using contingent workers is that: - ** VERIFIED ANSWERS ** ✔✔ they may not feel a strong connection to the company for which they are working Contingent work is a job situation in which an individual has an implicit contract for long-term employment. - ** VERIFIED ANSWERS ** ✔✔ False How many H-1B visas has Congress set as the maximum amount to be granted yearly? - ** VERIFIED ANSWERS ** ✔✔ 65, Since contingent workers are already specialists in a particular task, the hiring firm does not customarily incur which of the following? - ** VERIFIED ANSWERS ** ✔✔ Training Costs The False Claims Act was enacted during which war? - ** VERIFIED ANSWERS ** ✔✔ U.S. Civil War Foreign professionals can convert their H-1B visas into permanent green cards. - ** VERIFIED ANSWERS ** ✔✔ True Which of the following is an internationally recognized standard that companies can use to ensure that company data is protected in an outsourcing arrangement. - ** VERIFIED ANSWERS ** ✔✔ Statement on Standards for Attestation and Engagements No. 16 If a particular project requires only temporary help, and the workers will not be needed for future projects, the use of contingent workers is a poor approach. - ** VERIFIED ANSWERS ** ✔✔ False Which country is considered one of the best sources of programming skills outside of Europe and North America? - ** VERIFIED ANSWERS ** ✔✔ India
In which of the following practices does a business transfer all or part of its workforce to another firm, which handles all human-resource-related activities and costs? - ** VERIFIED ANSWERS ** ✔✔ Employee Leasing The Electronic Industry Citizenship Coalition established a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria. - ** VERIFIED ANSWERS ** ✔✔ False Which of the following is a part of the False Claims Act that allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds? - ** VERIFIED ANSWERS ** ✔✔ Qui Tam Provision Which of the following requires manufacturers to use at least 65 percent reusable or recyclable components and reduce or eliminate toxic material in their packaging? - ** VERIFIED ANSWERS ** ✔✔ European Union's Restriction of Hazardous Substances Directive The majority of people hired with H-1B visas in 2015 were hired primarily as which of the following positions? - ** VERIFIED ANSWERS ** ✔✔ Computer programmers and system analysts If a whistle-blower wants to remain unknown, the safest course of action is to leak information anonymously to the press. - ** VERIFIED ANSWERS ** ✔✔ True What classification is given to an individual who provides services to another individual or organization according to terms defined in a written contract or within a verbal agreement? - ** VERIFIED ANSWERS ** ✔✔ Independent Contractor Violators of the False Claims Act are liable for how many times the dollar amount for which the government was defrauded? - ** VERIFIED ANSWERS ** ✔✔ Three A situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees is called which of the following? - ** VERIFIED ANSWERS ** ✔✔ A co-employment relationship