BUSN 420 Week 6 Quiz (SOLVED)

BUSN 420 Week 6 Quiz (SOLVED)

Grade Details - All Questions
Question 1.
Question :
(TCO 7) The process behind the production of "Fast Pace," a racecar video game, is protected by _____.
 
Student Answer:
 
copyright law
 
 
 
patent law
 
 
 
trademark law
 
 

trade secrets law
 
Instructor Explanation:
Page 130
 
 
Points Received:
2 of 2
 
Comments:
 
 

Question 2.
Question :
(TCO 7) RiteMade Machinery, Inc., designs, makes, and sells a drill press. Steel Equipment Company copies the design without RiteMade's permission. Steel's conduct is actionable provided
 
Student Answer:
 
consumers are confused.
 
 
 
Steel's conduct is intentional.
 
 
 
Steel's conduct reduces the value of RiteMade's design.
 
 

RiteMade's design is patented.
 
Instructor Explanation:
Page 124
 
 
Points Received:
2 of 2
 
Comments:
 
 

Question 3.
Question :
(TCO 7) Joey reproduces Mina's copyrighted work without paying royalties. Joey is most likely excepted from liability for copyright infringement under the "fair use" doctrine if
 
Student Answer:
 
Joey copies the entire work.
 
 
 
Joey distributes the copies freely to the public.
 
 

Joey's use has no effect on the market for Mina's work.
 
 
 
Joey's use is for a commercial purpose.
 
Instructor Explanation:
Page 127
 
 
Points Received:
2 of 2
 
Comments:
 
 

Question 4.
Question :
(TCO 7) Diamond Financial Planners employs Ella, who is the firm's most productive performer. Ella, dissatisfied with the commission structure, quits to work for Feldstar Investments, Inc. She takes her list of Diamond clients to induce them to switch to Feldstar. Trade secrets law covers
 
Student Answer:

Diamond's list of clients.
 
 
 
Ella's performance.
 
 
 
Feldstar's commission structure.
 
 
 
none of the choices.
 
Instructor Explanation:
Page 130
 
 
Points Received:
2 of 2
 
Comments:
 
 

Question 5.
Question :
(TCO 7) Delite Toys, Inc., makes EZ Goo, a famous children's toy. Without Delite's consent, Fast Adhesives Company begins to use "ezgoo" as part of the URL for Fast's website. Fast claims that no consumer would confuse the website with the toy. Fast has committed
 
Student Answer:
 
copyright infringement.
 
 
 
patent infringement.
 
 

trademark infringement.
 
 
 
no actionable violation.
 
Instructor Explanation:
Page 121
 
 
Points Received:
2 of 2
 
Comments:
 
 

Question 6.
Question :
(TCO 8) Via the Internet, Rocky sabotages the computer system of Quik Chik'n Company, a food manufacturer, with the purpose of altering the levels of ingredients of the company's products so that consumers of the food become ill. Rocky is _____.
 
Student Answer:

a cyberterrorist
 
 
 
a botnet
 
 
 
a virus
 
 
 
a worm
 
Instructor Explanation:
Page 172
 
 
Points Received:
2 of 2
 
Comments:
 
 

Question 7.
Question :
(TCO 8) Via e-mail, Vern makes repeated credible threats to Ursula that put her in reasonable fear for her safety. This is ­­­_____.
 
Student Answer:

cyber stalking
 
 
 
employment fraud
 
 
 
phishing
 
 
 
vishing
 
Instructor Explanation:
Page 168
 
 
Points Received:
2 of 2
 
Comments:
 
 

Question 8.
Question :
(TCO 8) Nestor establishes a phony account in Meet+Greet, a social network, and creates a fictitious persona to cyberbully Leona. This is ­­_____.
 
Student Answer:

cyber stalking
 
 
 
employment fraud
 
 
 
phishing
 
 
 
vishing
 
Instructor Explanation:
Page 168
 
 
Points Received:
2 of 2
 
Comments:
 
 

Question 9.
Question :
(TCO 8) In Las Vegas, Nevada, Kurt places a bet on a football game with a bookmaker via a website based in Las Vegas. In Cleveland, Ohio, Dorothy places a bet on the same game with a bookmaker via a website based in Cleveland. Gambling is regulated in _____.
 
Student Answer:

all states
 
 
 
only a few states
 
 
 
no state
 
 
 
Ohio only
 
Instructor Explanation:
Page 175
 
 
Points Received:
2 of 2
 
Comments:
 
 

Question 10.
Question :
(TCO 8) Boris programs software to prompt a computer to continually crash and reboot. Boris's goal is to install this program on various companies' computer systems without the companies' knowledge. The program can reproduce itself, but must be attached to a host file to travel from one computer network to another. This program is ­_____.
 
Student Answer:
 
a hacker
 
 
 
a bot
 
 

a virus
 
 
 
a worm
 
Instructor Explanation:
Page 170
 
 
Points Received:
2 of 2
 
Comments:
 
 

 * Times are displayed in (GMT-07:00) Mountain Time (US & Canada)