Intellectual Property and Digital Media Ethics

Edit Answers
RTYWOOFFDXTLGAZEHZNF IQFUECXFKCVDFEXJKWST WJOIMXZITHGIRYPOCWWS RTNETAPJTWBAMFZDDLIK RMPIREHXNYWYPEYBLUTA WDQRKDGNIMROFTALPEDE BVUGSRIEORPMINWMOCDA DKDLNVASGHRLDRPVJVQI WEABCNNMINNWAKCHCQZN GEEHLAXNENIBXGQSFIHK GFRPRSVUFDFTZMIFFTPJ ROKRFQRTTZAOSLTABCYE EJUFDAVHKKZRRAEDRFGN MNIAHCKCOLBZTMCXEIQK HYNOISSERPXEUXAIIXSI EYNECNEGREVNOCBTTPIM ANOITAMROFNISIMHILPF KNOISSERPMOCSHDUAOUN ETMWDIOARGNIHSIHPFNM TDGJVPFFAFXGROTCEVMP
1.
This legal tool automatically protects original creative works like source code, scripts, and music the moment they are saved in a tangible form.
2.
This is used to protect brand identifiers such as channel names, logos, or slogans to distinguish your goods or services from those of competitors.
3.
Often compared to the width of a pipe, this term measures the maximum rate of data transfer across a given path at one time.
4.
This trend describes when previously separate technologies, such as cameras, telephones, and music players, merge into one device like a smartphone.
5.
A deceptive cyber threat where attackers send legitimate-looking emails or texts to trick you into revealing sensitive information like passwords.
6.
A notorious type of malicious software that encrypts all your files and demands a payment to unlock them.
7.
The unethical act of presenting someone else's work or ideas as your own without giving them proper credit or attribution.
8.
These are hyper-realistic, AI-generated fake videos, images, or audio that make it nearly impossible to tell what is real and what is fabricated.
9.
The act of a private company permanently banning a user from a platform to prevent real-world harm or enforce its terms of service.
10.
This is the smallest single dot of color on a digital screen, millions of which combine to make up a digital image.
11.
Images created using mathematical equations rather than pixels, allowing them to be scaled to any size without losing quality.
12.
The process of making digital files smaller so they are easier to send and store using fewer bits than the original.
13.
A method of communication where a single stream of data is sent to multiple, specific recipients on a network simultaneously.
14.
This type of intellectual property protects new and useful inventions, such as technical processes or machines, typically for a period of 20 years.
15.
This term refers to false information spread unintentionally, without a malicious motive to deceive others.
16.
This is false information that is deliberately created and spread to deceive people or cause specific harm.
17.
A decentralized digital ledger system used to record unique tokens and prove ownership through a permanent, public record.
18.
A unique digital token that acts as a certificate of authenticity for a specific item, though it rarely includes ownership of the underlying copyright.
19.
In copyright law, this term describes a work that exists in a stable, tangible form, such as being recorded or saved to a file.
20.
Copyright law only protects this specific, original realization of an idea, rather than the underlying idea, fact, or system itself