Filters
Question type

Study Flashcards

Information that may be protected as trade secrets includes


A) customer lists.
B) pricing information.
C) marketing techniques.
D) all of the choices.

Correct Answer

verifed

verified

Gargantua Equipment Corporation registers its trademark as provided by federal law. This registration gives notice that the mark belongs exclusively to Gargantua. This notice is


A) national.
B) limited to Gargantua's home state.
C) limited to Gargantua's market.
D) limited to those who have actual notice of it.

Correct Answer

verifed

verified

A trade name is used to indicate all or part of a business's name.

Correct Answer

verifed

verified

College Copy Shop (CCS) compiles, copies, and sells reading materials to students on the instructions of their professors, who indicate which parts of certain publications to include. These include texts published by Deep Topics, Inc. CCS does not obtain the permission of Deep Topics, or any of the other original publishers of the copied materials, and does not pay royalties on the sales of the compilations. Deep Topics and others file a suit against CCS, alleging infringement of the plaintiffs' intellectual property rights. Which type of intellectual property is involved in this situation? What is CCS's likely defense? How is a court most likely to rule? Explain.

Correct Answer

verifed

verified

The intellectual property at issue in th...

View Answer

GoodGro Inc. makes genetically modified seeds that are identical to Harvest Corporation's patented seeds, without Harvest's permission. This is most likely


A) copyright infringement.
B) patent infringement.
C) trademark infringement.
D) none of the choices.

Correct Answer

verifed

verified

Sea Coast Café uses the trademark of Tacos del Mar without permission. This use of the mark is actionable as trademark infringement


A) if consumers are confused.
B) all of the choices.
C) only if the two companies' products are similar.
D) if the use diminishes the distinctive quality of the mark.

Correct Answer

verifed

verified

The United States can prosecute foreign counterfeiters under U.S. law.

Correct Answer

verifed

verified

The need to protect intellectual property is recognized in the U.S. Constitution.

Correct Answer

verifed

verified

Berry Good LLC registers its trademark with the U.S. Patent and Trademark Office, and uses it to market a distinctive line of ice cream products. Crabapple Inc. uses the mark without Berry's consent to sell imitation frozen desserts. Berry has a cause of action against


A) Crabapple.
B) the U.S. Patent and Trademark Office.
C) consumers who buy Crabapple's desserts.
D) all of the choices.

Correct Answer

verifed

verified

Prognosis Inc. owns a brain-computer interface that enables physicians to diagnose and treat some diseases quickly and accurately. Federal copyright protection extends to


A) the general appearance of the app.
B) the parts of the app that can be read by computers.
C) the command structure of the app.
D) all of the choices.

Correct Answer

verifed

verified

Trademark dilution cannot occur online.

Correct Answer

verifed

verified

Like most successful companies, Phones Inc. has trade secrets. The law protects those secrets if the information is


A) not revealed to outside parties.
B) cataloged by the company as "confidential."
C) useful and is in fact used by the company.
D) unique and has value to a competitor.

Correct Answer

verifed

verified

The products involved in a trademark dilution suit must be similar.

Correct Answer

verifed

verified

Once a manufacturer's trademark is established, another manufacturer may use it without permission.

Correct Answer

verifed

verified

Graphix S.A. traffics in labels that bear counterfeit trademarks. This is a crime


A) only if the labels have negative effects on legitimate businesses.
B) only if the labels are attached to counterfeit goods.
C) under all circumstances.
D) under no circumstances.

Correct Answer

verifed

verified

Paving Corporation taps into the computer network of Roadwork Inc., a competitor, and downloads confidential business data without Roadwork's knowledge or authorization. This is most likely


A) copyright infringement.
B) patent infringement.
C) trademark infringement.
D) a theft of trade secrets.

Correct Answer

verifed

verified

Chris operates the Devil's Brew chain of coffee stands. "Devil's Brew" is


A) none of the choices.
B) a trade secret.
C) a service mark.
D) a trade name.

Correct Answer

verifed

verified

Without the permission of the copyright owner, Faye copies the literary expression of Game of Thrones, changes the names of the main characters, and publishes the result as her own work. This is


A) copyright infringement.
B) a "fair use."
C) a legitimate creative act.
D) none of the choices.

Correct Answer

verifed

verified

Don One decides to use his personal name for a line of clothing he is developing. In this circumstance, Don One will receive trademark protection under the law when


A) Don begins to market his line of clothing.
B) customers begin to associate the name with the source of the product.
C) Don begins to make his line of clothing.
D) all of the choices.

Correct Answer

verifed

verified

With respect to a patented process, all steps or their equivalent must be copied for infringement to occur.

Correct Answer

verifed

verified

Showing 21 - 40 of 72

Related Exams

Show Answer