Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Lesson 8: Exercise: Answer all questions.

1. Intellectual Property refers to ________ created by _________, ______ and________.


2. List four types of Intellectual Property protection
a)____________________
b)____________________
c)____________________
d)____________________
3. Identify 7 inventions protected by Intellectual Property Law
a)____________________
b)____________________
c)____________________
d)____________________
e)____________________
f)____________________
g)____________________
4. Trademarks for brand identity refer to ____________________________________.
5. Copyright for material means___________________________________________________________
__________________________________________________________________________________

6.

The above logos are invention that represents TV stations which are operating in our country.
These logos mean each TV stations are protected by a group of legal rights which called
Intellectual Property Laws.
Logo-logo di atas mewakili stesen-stesen TV yang beroperasi di negara kita. Logo-logo ini
membawa maksud stesen-setesen TV ini dilindungi oleh Undang-undang Harta Intelek.
a) What is the meaning of Intellectual Property Laws?
Apakah yang dimaksudkan dengan Undang-Undang Harta Intelek?
_____________________________________________________________________________________________
_____________________________________________________________________________________________
b) Name the type of protection that covers these logos and give another TWO inventions that
can be protected by laws. (3 marks)
Namakan jenis perlindungan yang diberikan terhadap logo-logo tersebut dan berikan DUA
ciptaan yang dilindungi dari segi undang-undang.
a)________________________________________
b)_________________________________________

LESSON 9: PRIVACY IN COMPUTER USAGE


1. Give definition for Privacy in IT?
______________________________________________________________________________________
2. In your own word, what you understanding about Information Privacy?
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
3. How does computer technology threaten the privacy of our data?
Through_______________,___________________ and__________
4. Cookies refer to__________________________________.

5.

Picture 1
Based on picture 1, X refer to______________________.
6. Computer technology threatens our privacy through electronic profiling. Give 1
situation_______________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
7. Why we need privacy in IT?we need privacy for_______________________________ and
___________________________.

You might also like