首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Intellectual Property Rights Information technology has presented legislators and lawyers—and you—with some new ethical ques
Intellectual Property Rights Information technology has presented legislators and lawyers—and you—with some new ethical ques
admin
2011-05-18
73
问题
Intellectual Property Rights
Information technology has presented legislators and lawyers—and you—with some new ethical questions regarding rights to intellectual property. Intellectual property consists of the products, tangible or intangible, of the human mind. There are three methods of protecting intellectual property. They are patents (as for an invention) , trade secrets( as for a formula or method of doing business) , and copyrights ( as for a song or a book).
Of principal interest to us is copyright protection. A copyright is the exclusive legal right that prohibits copying of intellectual property without the permission of the copyright holder. Copyright law protects books, articles, pamphlets, music, art, drawings, movies and computer software. Copyright protection is automatic and lasts a minimum of 50 years; you do not have to register your idea with the government (as you do with a patent) in order to receive protection.
These matters are important because the Digital Age has made the act of copying far easier and more convenient than in the past. Copying a book on a photocopier might take hours, so people felt they might as well buy the book. Copying a software program onto another USB flash disk, however, might take just seconds.
Public domain software, freeware and shareware can be legally copied, which is not the case with proprietary software.
Piracy is theft or unauthorized distribution or use. A type of piracy is to appropriate a computer design or program. This is the kind that Apple Computer claimed in a suit (since rejected) against Microsoft and Hewlett-Packard alleging that items in Apple’s interface, such as icons and windows, had been copied.
Software piracy is the unauthorized copying of copyrighted software. One way is to copy a program from one USB flash disk to another. Another is to download (transfer) a program from a network and make a copy of it.
Plagiarism is the expropriation of another writer’s text, findings, or interpretations and presenting it as one’s own. Information technology puts a new face on plagiarism in two ways. On the one hand, it offers plagiarists new opportunities to go far afield for unauthorized copying. On the other hand, the technology offers new ways to catch people who steal other people’s material.
According to the text, what is NOT correct about copyright protection?
选项
A、A copyright is the exclusive legal right.
B、Copyright law protects music, art, drawings, movies and computer software.
C、Copyright law prohibits copying of intellectual property without the permission of the copyright holder.
D、As a copyright holder, you must register your idea with the government to get protection.
答案
D
解析
本题是细节判断题。题目是:根据原文,如下有关版权保护的说法不正确的是哪项?选D的依据是第二段的最后一句:“Copyright protection is automatic and lasts a minimum of 50 years;you do not have to register your idea,with the government (as you do with a patent)in order to receive protection.”版权保护是自动的并持续至少50年;要得到保护,你无须向政府注册你的想法(像你注册专利那样)。选项D的说法与原文相反,符合题目要求,是正确答案。
转载请注明原文地址:https://www.kaotiyun.com/show/90Ld777K
本试题收录于:
职称英语理工类A级题库职称英语分类
0
职称英语理工类A级
职称英语
相关试题推荐
ABiologicalClockEverylivingthinghaswhatscientistscallabiologicalclockthatcontrolsbehavior.Thebiologicalclo
ABiologicalClockEverylivingthinghaswhatscientistscallabiologicalclockthatcontrolsbehavior.Thebiologicalclo
Asbothareligionandasocialforce,PuritanismhasmadeawidespreadinfluenceintheU-nitedStates.
ADigitalCodeHasWideApplicationsBFloppyDisksAreOutdatedCCDsAreDurableDCD’sWorkingPrincipleIsExplainedE
Whichofthefollowingstatementsiscorrectaccordingtothepassage?Membersofthetribesgototherstodosomethingby____
InventorofLEDWhenNickHolonyaksetouttocreateanewkindofvisiblelightingusingsemiconductoralloys,hiscolleaguest
ShakespeareWhentalkingabouttheworld’sgreatestpoetandgreatestdramatist,onlyonenamecanpossiblesuggestitself;that
FoodandHealthThefoodyoueatdoesmorethanprovideenergy.Itcanhaveadramaticeffectonyourbody’sabilitytofig
High-TechWarfare(战争) Today,high-techwarfareisnolongeranabstractconcept,butarealissue. Technology______(51)ta
随机试题
关于封闭式基金的认购,说法错误的是()。
由发行人发行的附有特定条件的一种有价证券,允许持有人按某一特定价格在规定的期限内购买既定数量的标的资产,该有价证券是()。
出口食用动物饲料:直属检疫局在15个工作日内对申请单位做出审核。《登记备案证》有效期5年,期满前6个月重新提出申请。年审为12.1-1.30。( )
F公司为一家稳定成长的上市公司,20×2年度公司实现净利润8000万元。F公司上市三年来一直执行稳定增长的现金股利政策,年增长率为5%,吸引了一批稳健的战略性机构投资者。20×1年度每股派发0.2元的现金股利。F公司20×3年计划新增一个投资项目
在利用资本资产定价模型确定股票资本成本时,下列关于市场风险溢价的说法中正确的是()。
业主委员会是业主大会的()机构。
用具有一定的信度和效度的标准化量表(或问卷)对人的心理特征进行测量和评定的方法称为()。
下列属于完善初次分配机制的举措有()。
在ISDN网络中,与ISDN交换机直接相连的是(46)设备,他们通过(47)实现互连。NT1到用户设备之间的连接点是(48)。对于非ISDN设备要通过(49)设备接入ISDN网络,该设备的主要作用是(50)。
若某二叉树的前序遍历访问顺序是abdgcefh,中序遍历访问顺序是dgbaechf,则其后序遍历的结点访问顺序是______。
最新回复
(
0
)