COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

INTELLECTUAL PROPERTY RIGHTS AND PRIVACY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The main tactic used to circumvent ____ is to register numerous domain name variations as soon as an organization thinks it might want to develop a web presence.
A
Cyberdomain
B
Cybertransient
C
Cybertenancy
D
Cybersquatting
Explanation: 

Detailed explanation-1: -Unlike patents, the protection of intellectual property in the form of trade secrets does not require the disclosure of related information to relevant authorities. Trade secret protection has an advantage of not being limited in time and may continue indefinitely as long as the secret is not revealed to the public.

Detailed explanation-2: -Open source code is any program whose source code is made available for use or modification, as users or other developers see fit.

There is 1 question to complete.