What is copyright and what are your thoughts on it?

Answers

Answer 1
Answer: It’s a type of property marking that gives an owner the right to copy creative pieces/work. I think that it makes life easier
Answer 2
Answer:

Answer:

Copyright is a type of intellectual property that gives its owner the exclusive right to make copies of a creative work.

Explanation:


Related Questions

Write a program that declares variables named init1, init2, and init3, to hold your three initials. Display the three initials with a period following each one, as in J.M.F.
_ is the adherence to a personal code of principles.EthicsMoralityIntegrityHonestySection B
Given the acquisition environment and circumstances described in the BSVD Program documents, do you recommend contracting without providing for full and open competition for the BSVD bio-sensor contract? Preface your response with either of the following: "Yes, we recommend contracting without providing for full and open competition" or "No, we do not recommend contracting without providing for full and open competition." Note: References to the specific FAR exceptions to full and open competition are not necessary, as these will be addressed in question 2(b). Focus your response on the facts presented in the case and what you find appropriate in relation to conducting full and open competition or limiting competition. Provide at least three facts from the case that support your rationale and explain how these facts lead to your conclusion.
Select the correct answer. Which decimal number is equivalent to this binary number? 11111011
What is the purpose of creating a PST file?Question 18 options:a)To document an antivirus pattern that continues to be sent to your mailboxb)To insert as a Signature for all outgoing emailsc) To save your emails so that you can restore your mailbox if necessaryd)To create a file that deleted emails will be sent to for deletion

Anna is a high school senior who plans to go to UT in the fall. Her parents have saved up some moneyfor her college education, but it will not be enough to pay for her tuition all four years. She does not
believe she will qualify for need based assistance. What advice would you give Anna?

Answers

Since Anna  does not believe she will qualify for need based assistance, the  advice that I would  give Anna is that she should be hopeful and not worry and then I will tell her also that since her parents cannot afford the fees, then she is more than qualified for it.

What is a need-based aid?

If you have a financial need and meet other eligibility requirements, you may be eligible for need-based funding. More need-based aid than what you actually need is not permitted.

Therefore,   the best advice one can give a person who is having financial issues is that they need to be confidence and also have the courage to believe that when they source for college funds, they will get it.

Learn more about assistance from

brainly.com/question/26641539
#SPJ1

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security

Answers

Incomplete question. Here's the full question:

Data-Time Inc. is a company that manages databases for a large city in Colorado. Included in these databases is information collected from the city’s homeless shelters and free clinics. Specifically, the databases contain personal information of the users of these services over the past 10 years; this includes people’s Social Security numbers and health records.

This data is highly secure and only accessible to the employees of Data-Time Inc. Employees are given a laptop when they are hired which allows them to access the database remotely. Unfortunately, one of these laptops is stolen and the security of the database is compromised.

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security?

Explanation:

Since the emphasis is not on reversing the breach that has occurred, but on managing the level of security damage that could occur, it is important measures are directed towards preventing unauthorized access to sensitive information.

For example, the Media Access Control Address (MAC address) of the laptop if known could be greylisted from accessing the server that contains the sensitive information.

Describe how a web browser and web server work together to send a web page to a user

Answers

TCP/IP, a network protocol, is used by a browser to connect to a web server and launch a Hypertext Transfer Protocol. The HTTP tries to get info and provide it for displays.

What is a web page?

A web page is a straightforward document that a browser can see. These documents are created using the HTML coding system. Tsi involves the data and the content that can be presented online.

The consumer must either type in URL for the page they want to access via the web or click on the hyperlink that contains the URL.

The Ip identifies the Website browser's Web address, and for the Search engine to comprehend it, they must both utilize the very same normal procedure. The Hypertext Transfer Protocol is the preferred means of communication here between a web browser and a server (HTTP).

Learn more about web page, here:

brainly.com/question/9060926

#SPJ2

In order to get a page from the web , the user must type the Internet Uniform Resource Locator (URL) for the page he or she wants, or click on the link that provides the URL. The URL specifies the Internet address of the Web browser to be understood by the Web browser, they must use the same standard protocol. The standard protocol for communication between Web browser and a Web server is Hypertext Transfer Protocol (HTTP). 

. One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is to:A.
report which device drivers a computer uses

B.
determine which ports are open on a computer

C.
report the status of individual computer users

D.
determine which operating system is running on a computer

Answers

Answer: C)report the status of individual computer users

Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.

Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)

Manufactured computers and cell phones are part of which industry? Electronics Chemicals Machinery Metal products

Answers

Answer:

The correct answer is the electronic industry

Hope this helps

Answer:

Electronics

Explanation:

Which is true of diagnosing and troubleshooting? Diagnosing attempts to identify the source of a problem, while troubleshooting looks for the nature of the problem. Diagnosing is used to fix problems with hardware, while troubleshooting is used to fix problems in program code. Diagnosing looks for the nature of the problem, while troubleshooting attempts to identify the source of the problem. Diagnosing is used to fix problems in program code, while troubleshooting is used to fix problems with hardware.

Answers

Answer:

the answer is c

Explanation:

i just took the test

Answer:c

Explanation: because Diagnosing looks for the nature of the problem, while troubleshooting attempts to identify the source of the problem.