1/27
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Copyright laws allow for _____ where copyrighted literary works can be quoted and a small segment of a video work can be displayed for limited purposes such as classroom instruction.
fair use
To be eligible for a(n) _____ the invention must be a process, machine, or composition of matter that is unknown or unused by others before being awarded.
patent
The Copyright Term Extension Act extends the term for copyright protection another _____ years.
20
An issue that had not been fully addressed in prior acts, but was singled out in the Digital Millennium Copyright Act, is the _____ liability, the liability of third parties for copyright infringement of others.
intermediary
To state the _____ theory more simply, we should provide enough intellectual property protection to serve as an inducement for future innovation.
utilitarian
_____ is software such as Adobe's Acrobat Reader that is distributed with the source code at no charge.
Freeware
A(n) _____ license allows a user to redistribute the open source code with modifications or enhancements, but only under the same open source license under which that user received that code.
copyleft
Because MP3 files are unsecured, they can be distributed easily through the internet and lead to the potential for _____, the illegal copying and distributing of music.
piracy
When someone registers a domain name like googlesucks.com, the practice is referred to as _____.
cyber griping
Because many of the new business patents were for online business methods, they became known as _____.
Cyberpatents
A prominent technology that gives content providers enhanced control over their material is known as _____, where content providers distribute work in cyberspace in an encrypted form accessible only by users with this type of hardware or software.
trusted systems
Individuals need _____ over their personal data to ensure restricted access to it.
Control
A(n) _____ is placed across a network of related sites so that users' movements can be tracked not just within a certain site but within any site that is part of this network.
Third-party cookie
_____ are small data files that are written and stored on the user's hard disk drive by a website to track the user when the user visits that site.
Cookies
The _____ approach for protecting consumer privacy is when individuals explicitly approve secondary uses of their personal data.
Opt-in
This type of controversial tracking system, a(n) _____, is placed across a network of related sites so that the movements of users can be tracked not just on the initial site but on all related sites of that network.
third-party cookie
_____ is when an email is sent to a user that looks authentic but takes them to a link where they are asked to enter sensitive personal information.
Phishing
A(n) _____ is a self-replicating program usually hidden away in another host program or file that can disrupt a computer.
Virus
_____ travel automatically from one computer to another across network connections.
Worms
The two types of malware that form ransomware are the _____ designed to spread from one computer to another and the _____ that is delivered by it. Note: Separate the two answers with a semicolon (;).
worm; encrypting software
_____ involves the unauthorized duplication of proprietary software and the distribution or making available of those copies over the network.
Software piracy
Embedded in iTunes is a Digital Rights Management tool called ____ that limits the distribution of iTunes music.
fairplay
A(n) _____ combines hacking and political activism.
hacktivist
____ break into computer systems to steal data or plant worms.
Hackers
_____ filtering has emerged as a tool to stop DoS attacks because of the ability to filter incoming and outgoing packets.
Router-based
When using a key management infrastructure system, a certification authority functions as a digital _____ to verify the identity of the individual associated with a given key.
notary public
Because governments have been apprehensive about exporting sophisticated encryption systems due to the worry of international terrorism, governments have sought to gain a sort of regulation through _____ access.
backdoor
The United States has retreated from its impulse to regulate _____ but there is no guarantee that it will not impose new regulations.
encryption