Vocab Bank
Copyright, license, fair use, creative commons, plagiarize, piracy, creative work, public domain
1. Amy decided to her paper for class by copying and pasting from Wikipedia and saying she wrote it.
2. Because Zoe used a small amount of a movie in a remix video she made that pokes fun at the main
character, she could say it's
3. Robbie found a photo in the that's no longer copyrighted, so he could use it however he wants
4. Angela has a Flickr page with all of her photos, and in order to define for others how she wants her photos
to be used, she created a copyright that is listed on her page.
5. Alex had an idea for a poem in his head for the longest time, but once he finally wrote it down it instantly
had a
6. Eric uses a program where he "rips" movies and burns" them to DVDs, which he then sells to friends.
What Eric is doing is called
7. When Dwayne used a kind of copyright to make it easy for others to copy and share his video, he was
using
8. Books, movies, music, websites, games, and pieces of art are all examples of

Answers

Answer 1

Explanation:

what are the words.........


Related Questions

My laptop is stuck on the blue screen of death I can’t shut it down what should I do plz help ASAP

Answers

I think you must wait for sometimes and it will restart itself

Answer:

either wait for it to restart on its own or hit control+alt+delete and then restart it.

Explanation:

explain where and why metallic material or non metallic material have been used in your home​

Answers

Answer:

Metallic and non-metallic material use for various purposes at home.

Explanation:

Metals play an essential role in our lives. They used while constructing houses as a support to it. It's also used for architectural (building) purposes include frames, pillars, water pipes, roofing, and windows. Copper used for making electrical wires. Aluminium for making electrical cables, packaging, and cooking utensils. Iron application, including roofing and decoration.

Metallic materials are inorganic substances such as iron, copper, aluminium. Non-metallic elements, such as carbon, nitrogen, and oxygen. Carbon used in the form of diamonds and graphite. Hydrogen is used daily as a gas.

Write statementsto show how finding the length of a character array char [ ] differs from finding the length of a String object str.

Answers

Answer:

Length of char array: sizeof(arr)

Length of a string object: myString.length()

Explanation:

The sizeof approach is generally not recommended, since this information is lost as soon as you pass the array to a function, because then it becomes a pointer to the first element.

who designed analatic engine in the 1930's?​

Answers

Answer: Charles Babbage

Explanation: English mathematician and inventor Charles Babbage is credited with having conceived the first automatic digital computer. During the mid-1830s Babbage developed plans for the Analytical Engine. Although it was never completed, the Analytical Engine would have had most of the basic elements of the present-day computer.

Hope this helps^^

Caleb is leading a project involving the use of natural resources, but his group is having problems finding its focus with such a large topic. Caleb organizes several online meetings in which he instructs the group on how to narrow the topic and find direction. He also schedules frequent "check-in" meetings to evaluate their progress. The group gets so excited that they miss the deadline for turning in their project. Which qualities of an effective digital leader are being demonstrated by Caleb? Check all that apply. problem-solving skills good time-management overseeing group tasks effective scheduling excitement about the project

Answers

Answer:

(A)  (C)   (E)

problem-solving skills

overseeing group tasks

excitement about the project

Explanation:

Caleb is leading a project involving the use of natural resources, but his group is having problems finding its focus with such a large topic. Caleb organizes several online meetings in which he instructs the group on how to narrow the topic and find direction. He also schedules frequent "check-in" meetings to evaluate their progress. The group gets so excited that they miss the deadline for turning in their project.

Which qualities of an effective digital leader are being demonstrated by Caleb? Check all that apply.

problem-solving skills

overseeing group tasks

excitement about the project

its 100% CORRECT PEOPLE

After execution of the following code, what will be the value of input_value if the value 0 is entered at the keyboard at run time? 15 10 25 0 5

Answers

Question:

After execution of the following code, what will be the value of input_value if the value 0 is entered at the keyboard at run time?  

cin>> input_value;

if (input_value >5)

input_value = input_value+5;

else if (input_value > 2)

input_value= input_value+10;

else

input_value= input_value + 15;

Answer:

input_value= 15

Explanation:

Line 1 of the program gets the value of user_input

i.e user_input = 0

Line 2 checks if user_input is greater than 5, since this is false, the program jumps to line 4

Line 4 checks if user_input is greater than 2, since this is also false, the program jumps to line 6

The instruction on line 6 implies that, if the previous conditions are false, then line 7 be executed.

So:

input_value= input_value + 15;

input_value= 0 + 15

input_value= 15

Hence, input_value is 15

Use the drop-down menus to select the type of goal described in each statement. I want to finish all of my social studies homework by dinner. I want to graduate in three years in the top 15% of my class. I want to earn a good grade on my math test tomorrow. I want to qualify for Honors Spanish next year.

Answers

Answer:

I want to finish all of my social studies homework by dinner. - Short term goal.

Short term goals are targets that are to be achieved in the near and immediate future such as in a day or in a week. As the goal listed is to be done on the same day, it is a short term goal.

I want to graduate in three years in the top 15% of my class.  - Normative Goal

Normative goals are the goals people set based on what society looks upon as desirable and a good thing to do. Academic excellence is a normative goal as it is looked upon favorably by society.

I want to earn a good grade on my math test tomorrow. - Intrapersonal goals.

Intrapersonal goals are goals that we set within ourselves to motivate ourselves to do better. The writer here wants to do a good job in the math test which makes it intrapersonal.

I want to qualify for Honors Spanish next year. - Long term goal

A long term goal is one that is to be achieved in the future most likely after a period of a year. Qualifying for an Honors in Spanish in the next year is therefore a long term goal.

Answer:

I want to finish all of my social studies homework by dinner. - Short term goal.

Short term goals are targets that are to be achieved in the near and immediate future such as in a day or in a week. As the goal listed is to be done on the same day, it is a short term goal.

I want to graduate in three years in the top 15% of my class.  - Normative Goal

Normative goals are the goals people set based on what society looks upon as desirable and a good thing to do. Academic excellence is a normative goal as it is looked upon favorably by society.

I want to earn a good grade on my math test tomorrow. - Intrapersonal goals.

Intrapersonal goals are goals that we set within ourselves to motivate ourselves to do better. The writer here wants to do a good job in the math test which makes it intrapersonal.

I want to qualify for Honors Spanish next year. - Long term goal

A long term goal is one that is to be achieved in the future most likely after a period of a year. Qualifying for an Honors in Spanish in the next year is therefore a long term goal.

A network that typically reaches a few meters, such as up to 10 meters (33 feet), and consists of personal devices such as mobile computers, smartphones, and handheld devices is called:_______

Answers

Answer:

PAN (Personal Area Network)

Explanation:

A network that typically reaches only a few meters (10 m or 33 ft) and contains personal devices like mobile computers, smartphones and handheld devices is called PAN (Personal Area Network).

PAN enables communication between devices that are near a human being (i.e. only for shorter distances).

It can be wireless such as bluetooth earphones used with the smartphone, wireless keyboard and mouse used with laptop or computer, TV and remote control communication.

It can be wired such as wired earphones used with the smartphone, any USB (Universal Serial Bus) device connected to a computer/laptop.

What does this road sign mean?

Answers

Answer:

Speed limit 50 ahead

Explanation:

Speed limit is 50 up

A computer _________ is any person whose primary occupation involves the design, configuration, analysis, development, modification, testing, or security of computer hardware or software.

Answers

Answer:

Engineering

Explanation:

Because they are the one who create software applications

1. Which of these is an example of output?
A. typing on a keyboard

B. a smartphone ringing

C. using a mouse

D.a fingerprint sensor


2. Which of these is an example of input?

A. music playing through a smartphone’s speaker

B. a video playing on a laptop

C. swiping right to choose a picture a

D. phone vibrating when there is a new text

Answers

Answer:

Output: B

Input: C

Explanation:

An input is something which is given in order to cause something (Example: You click on a video, and it starts playing)

Output is something that occurs due to the input (The video playing is the output of your input)

The example of output is smartphone ringing.

The example of input is swiping right to choose a picture

The input/output in computing are simply known as the communication between an information processing system.

With inputs devices, signals or data received by the system. With outputs devices, signals or data are sent from them.

These devices are the pieces of hardware used by a human.

Conclusively, Devices for communication between computers, Includes modems and network cards etc.

Learn more from

https://brainly.com/question/17241201

which protocol is used by the network?

Answers

Answer:

TCP/IP and UDP/IP and HTTP and FTP

Explanation:

no explanation for this

Answer: TCP/IP,  UDP/IP, HTTP and FTP

Explanation:

Hope this helps^^

briefly explain about five kinds of network topology ​

Answers

Answer:

The mapping of the LAN (local area network) is design called as Topology.

Explanation:

The network topology is to perform a arrangement of the network to the connect sender and receiver in the network connection, there is a five type of topology is there are:- (1) tree topology (2) star topology (3) ring topology (4) bus topology (5) mesh topology.

(1) Tree topology is the nodes are connecting to the hierarchical form it is called by the hierarchical topology its used in the wide area network, and they are manage and maintain the easily, they work in the group.(2) star topology is to the connected to the all computers in a single hub cable through, it is dedicated to the hub connection, star topology is the setup and modify to the network and nodes and low network, is to expensive to use.(3) Ring topology is tho perform it computer to connect by the another computer for each device, ring topology is the use large number and to star topology is to install and expand, troubleshooting is the difficult in the ring topology.(4) Bus topology is the contain computer network device is connected to the single cable, and this only one direction system, bus topology is used in small networks and bus topology is the cost effective, and the bus topology is the limited length cable.(5) Mesh topology is to perform point to point connection to computer devices, and to transmits data to two ways (1) routing (2) flooding.Mesh routing is network requirement and has information of the broken links.Mesh flooding is transmitted to the all computer network and leads to load over network.

What is qwerty and why is it on the keyboard?

Answers

Answer:

qwerty is the main way people sort out there keyboard as you can see on the left side of the keyboard there is W,A,S,D

Explanation:

AnswerQWERRTY

Explanation:

EEEEEE

A friend has asked you to help him find out if his computer is capable of overclocking. How can you direct him? Select all that apply.

Answers

Explanation:

Any computer is capable of overclocking; however, depending on the CPU manufacture and motherboard vendor, options may be removed or limited causing potential issues with overclocking.

Note, when overclocking computer hardware, this typically involves the increase of voltage or current which will increase heat output inside the system.

The first thing you want to do is make sure there is adequate cooling for the system, that can handle the level of overclock you plan on applying.

The second thing you want to do is check motherboard and CPU overclocking compatibility as some CPUs or some motherboards are arbitrarily locked down.

The third thing you want to do is to ensure your power supply will be able to handle the additional load applied by the overclock.

The fourth thing you want to do is check that the motherboard bios is accessible.  Without access to the bios, any attempts at hardware overclocking may be void.

If all these things are true or valid, then you should be able to easily apply an overclock to your computer system.

Cheers.

If you copy a drawing from the Internet and use it in a report, you might be violating the artist's
A. Digital Rights
B. Intellectual Property Rights
C.Fair use rights
D.Artistic rights

Answers

Answer: D. Artistic rights

Explanation:

The artistic rights are those rights that provide an artist with the protection of both artistic works and also allows the profit. The artist can create a piece of artistic work and distribute it for their profit.

If one without any permission creates a copy or uses original artistic work for their own purpose then he is subject to the punishment of copyright infringement due to breaching the copyright of the owner's protection.

The artistic rights will be violated if we copy a drawing from the internet and use it in a report.

If a person copies a drawing from the internet and use it in a report, then the intellectual property right of the artist has been violated.  

Intellectual property rights refer to the legal rights which are given to the authors or the creators of a particular work for their works or inventions.

Examples of intellectual property rights include trade secrets, trademarks, copyrights and patents.

It should be noted that it is unlawful for someone to use or copy the work if another person without taking permission from them. In such case, the Intellectual property right of the person has been violated.

In conclusion, the correct option is B.

Read related link on:

https://brainly.com/question/14391069

Exploits are gaps, holes, weaknesses, or flaws in corporate networks, IT security defenses, user training, policy enforcement, data storage, software, operating systems, apps, or mobile devices that expose an organization to intrusions or other attacks. Select one: True False

Answers

Answer:

The answer is "False".

Explanation:

In the given question, the answer is false because it stands for " vulnerability", that is an application hole, that is used to design the implementation of the errors.

It enables a hacker to damage the application's investors. The device owners, application users as well as other groups dependent on this software, which include stakeholders, that's why we don't use this application in the cybersecurity  

Why can repitition be used in emphasis.

Answers

Answer:

Repetition is an important literary device because it allows a writer or speaker to place emphasis on things they choose as significant. It tells the reader or audience that the words being used are central enough to be repeated, and lets them know when to pay special attention to the language.

What peripheral port type was originally developed by Apple and is currently regarded as the optimal interface for digital video transfer

Answers

Answer:

IEEE 1394

Explanation: Common port used for video preipherals and other video transfer

. Which of the following is not advantages of computer network? *

i. Data or program can be shared
ii. All Hardware devices can be shared
iii. Data processing is faster and economic
iv. None of them

Answers

Answer:

My answer is Data or program can be shared.

the program is not going into the if loop but directly in the else one and is saying 'wrng answer' even if it is right. where is the problem? (i will give brainliest please HELPPPPPPPP) this is python btw

Answers

Answer:

convert the input to an integer:

 ans = int(input(str(num1)+"+"+str(num2)+"="))

Explanation:

Your code is comparing an integer to a string, which will always return false. If you cast your input to an integer using the int() function, your problem should be solved.

Customer Service. Is an organization's ability to _______ customers

Answers

Answer:

Serve

Explanation:

Customer Service

Answer:

At its most basic level, customer service is an organization's ability to supply their customers' wants and needs. But this definition leaves out the transactional nature of customer service, and it's this transactional aspect that drives customer loyalty.

Explanation: Hope this helps!

Which of the following is something that an information technology (IT) professional would do? A. build and repair computers B. create and improve software C. collect and utilize data D. manage grades and enrollments

Answers

I believe it’s letter C because that’s the only one that makes more sense

A _____ is an information system that enables users to retrieve data from the Web by using keywords related to their topic of interest.

Answers

Answer:

Search engine

Explanation:

A search engine is an information system that enables users to retrieve data from the Web by using keywords related to their topic of interest.

Search engine are softwares that helps users look for information on the internet in a systematic way. It makes information easily available for users.

Search engines allows the users to have access to different perspective about their inquiries. It provides users with information from web pages, images, videos, articles, research paper.

Examples of search engines includes: Google, Bing, ask.com, Yahoo etc.

which information purpose uses video from a security camera?

Answers

Answer:

robbery

Explanation:

it records a robbery so that police can later find out who did it

In Microsoft Excel, you are working with a large worksheet. Your row headings are in column A. Which command(s) should be used to see the row heading information in columns X, Y, and Z?

Answers

Answer:

The answer is "freeze panes command".

Explanation:

To see the row heading information into the columns "X, Y, and Z" we use the freeze panes command, which Pick's the cells from rows and on the right side of the columns, where you scroll.  

This tool allows you to block columns/row headings so, the first column /or top row will stay on the screen and you also scroll down or over to see the rest of the panel.

Harry is the cloud administrator for a company that stores object-based data in a public cloud. Because of regulatory restrictions on user access to sensitive security data, what type of access control would you suggest he implement to meet his company's security policies?

Answers

Answer:

The correct answer will be "Mandatory access control".

Explanation:

MAC seems to be a security standard protocols limited by the designation, initialization including verification of the systems. These policies and configurations are implemented through one centralized controller and therefore are accessible to the system admin.MAC establishes and maintains a centralized implementation of sensitive requirements in information security.

​Most online auction sites offer merchandise that is the property ____, much as an auctioneer would at a public auction.

Answers

Answer:

The answer is "of others".

Explanation:

The auction site has become a service, in which auction clients or members are using the internet to buy or sell goods and services.  

These sites use the different auction sites, which include forums for consumers, operated by multiple software, that's sale forms also recognized as a virtual auction. These sites sell items owned by the others, which is an auctioneer does at a public auction.

A hard drive or solid state drive that is physically installed inside of a workstation would generally be considered to be what type of storage?

Answers

Answer:

Answered below

Explanation:

A secondary storage device, also called external storage or auxiliary storage device, is a non-volatile, internal or external storage device. They are storage devices that are used to store data permanently and can be used to store large amounts of data. Applications and programs in a computer, such as operating systems, drivers, files, applications etc are stored in the secondary storage device.

Examples of these devices include;

Hard disk drives, solid-state drives, CD-ROMS, DVD, Google drive, USB flash drive etc.

Select the correct answer. Matt works for an advertising agency. He is often involved in the designing and development processes of websites. What is his profession? A. web developer B. video game developer C. multimedia designer D. graphic designer

Answers

Answer:

MAY BE A

Explanation:

I THINK A IS THE CORRECT ANSWER

Other Questions
The left and right page numbers of an open book are two consecutive integers whose sum is 321 Find these page numbers. What is the factorization of the trinomial below?12x2-x-35 Find the value of x if O is between D & B and DO = 15, OB = 3x + 7, and DB = 9x - 2 x= ____ please help i cant figure this out 7(4+t) - 5(t+1) = What conclusions can be drawn from the graph? Select two options.The coldest year since 1950 was 1983.The hottest year since 1950 was 1957.Most years since 1990 have been hotter than the 20th-century average.Most years from 1950 to 1960 were colder than the 20th-century average.Temperatures varied farther from the average in the 1990s than the 1980s. A factory employee worked 3/4 of an hour to finish 2/5 of a project. At this rate, how many additional hours will theemployee require to finish the project?0.450.51.12501.251.875 So i missed a day at school and don't know how to solve 1.2/8.4 = w/14.Can anyone help. A reason Spanish conquistadors went to the Americas during the 1500s was to prevent war with the American Indians. protect the American Indian way of life. learn about American Indian culture. spread Christianity to American Indians. True or False: Results that are practically significant will always be statistically significant. show work plz !!!!!!!!!!!! Classify the two given samples as independent or dependent. Sample 1: Pre-training blood pressure of 17 people Sample 2: Post-training blood pressure of 17 people a. dependent b. independent Angle PSR measures 99. What is the measure of PSQ in degrees? solve for n 36=13n-4n Why were the Mississippian Indians considered to be an advanced culture? What is your speed if you travel 7564 km in 23 hours? Convert this to miles per hour. Unlike the native territory of Ancient Greece the ancient Roman homeland Find the area of the rectangle . (9,-1), (-1,7), (-5,2), (5,-6) Based on findings of Collins et al., how would you create a feeling that a prosthetic limb belonged to a person with an amputated hand? Sockton AA story that ends with the statementI had never felt so embarrassed in my life.450words which statement describes a risk of technological design of headphones?