Question
1. Sharing stored music files through the use of peer-to-peer (P2P) networking most typically constitutes: a. copyright infringement. b. patent infringement. c. theft of trade
1. Sharing stored music files through the use of peer-to-peer (P2P) networking most typically constitutes:
a. copyright infringement.
b. patent infringement.
c. theft of trade secrets.
d. trademark infringement.
2. If an inventor designs a new, novel, and very useful device does not want anyone else to manufacture the device he designed without her permission, the most logical course of action would be for the inventor to:
a. create and register a trademark for the design.
b. acquire a patent for the design.
c. register the design as a copyright.
3. Which of the following statements is most accurate?
a. A trademark may be comprised of a visual design (i.e., logo) and a trade name.
b. A trademark may be a visual design (i.e., logo).
c. Both of the above statements are accurate.
4. Jones operates an Internet-based website business under the name,Websites 'R Us. Which of the following statements is most accurate?
a. Toys 'R Us, a well-known toy store chain, has a viable claim that Jones' trade name constitutesdilutionof its trademark.
b. Toys 'R Us' only viable claim iscybersquattingbecause Jones' business is Internet-based.
c. Toys 'R Us has no viable claim because consumers could not reasonably conclude that Jones sells toys.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started