The acquisition of a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as ____.

A. cyberinvasion
B. cyberintrusion
C. digital invasion
D. cybersquatting


Answer: D

Computer Science & Information Technology

You might also like to view...

A __________ interface allows the user to interact with the operating system and other programs by using graphical elements.

a. graphical menu b. graphical user c. command line d. command prompt

Computer Science & Information Technology

The _________ layer deals with the logical structure of files and with the operations that can be specified by users, such as open, close, read, and write.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Refresh/Restore is a Windows installation method that _______________.

A. reinstalls an OS B. attempts to fix errors in an OS C. refreshes the screen during installation D. restores an OS to original factory status

Computer Science & Information Technology

Which of the following are the reserved words?

a. public b. static c. void d. class

Computer Science & Information Technology