FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A HACKER

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This is used to protect formulas, technical information, recipes and source codes ____
A
parent
B
creative commons
C
a safe
D
trade secret
Explanation: 

Detailed explanation-1: -Only patents and utility models can provide this type of protection. A trade secret may be patented by someone else who developed the relevant information by legitimate means, for example, inventions developed independently by others. Once the secret is made public, anyone may have access to it and use it at will.

Detailed explanation-2: -The secret formula for Coca-Cola, which is locked in a vault, is an example of a trade secret that is a formula or recipe. Since it has not been patented, it has never been revealed. The New York Times Bestseller list is an example of a process trade secret.

Detailed explanation-3: -Trade secrets are a key component of IP portfolios helping businesses protect their secret formulas, know-how and other key information that gives them a competitive edge. Read our real-world trade secret cases for examples of how companies have used trade secrets to protect their intellectual property.

Detailed explanation-4: -Trade secrets are information of any type that is valuable to its owner because it is not generally known in the industry and its owner has taken reasonable steps to maintain the information in confidence. Examples of trade secrets include customer lists, source code, and semiconductor manufacturing processes.

There is 1 question to complete.