1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuki888 [10]
2 years ago
14

Which of the given original work is protected by the copyright law?

Computers and Technology
1 answer:
DochEvi [55]2 years ago
5 0
Answer: D. the fault in our stars by john green
You might be interested in
In this scenario, two friends are eating dinner at a restaurant. The bill comes in the amount of 47.28 dollars. The friends deci
pickupchik [31]

Answer:

The java program for the given scenario is as follows.

import java.util.*;

import java.lang.*;

public class Main

{

   //variables for bill and tip declared and initialized

   static double bill=47.28, tip=0.15;

   //variables for total bill and share declared

   static double total, share1;

public static void main(String[] args) {

    double total_tip= (bill*tip);

    //total bill computed

    total = bill + total_tip;

    //share of each friend computed

    share1 = total/2;

    System.out.printf("Each person needs to pay: $%.2f", share1);  

}

}

Explanation:

1. The variables to hold the bill and tip percent are declared as double and initialized with the given values.

static double bill=47.28, tip=0.15;

2. The variables to hold the values of total bill amount and total tip are declared as double.

3. All the variables are declared outside main() and at class level, hence declared as static.

4. Inside main(), the values of total tip, total bill and share of each person are computed as shown.

double total_tip= (bill*tip);

total = bill + total_tip;

share1 = total/2;

5. The share of each person is displayed to the user. The value is displayed with only two decimal places which is assured by %.2f format modifier. The number of decimal places required can be changed by changing the number, i.e. 2. This format is used with printf() and not with println() method.

System.out.printf("Each person needs to pay: $%.2f", share1);  

6. The program is not designed to take any user input.

7. The program can be tested for any value of bill and tip percent.

8. The whole code is put inside a class since java is a purely object-oriented language.

9. Only variables can be declared outside method, the logic is put inside a method in a purely object-oriented language.

10. As shown, the logic is put inside the main() method and only variables are declared outside the method.

11. Due to simplicity, the program consists of only one class.

12. The output is attached.

5 0
4 years ago
Read 2 more answers
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
An intentional action designed to prevent legitimate users from making use of a computer service is called
MatroZZZ [7]
Denial of Service Attack. If multiple machines are involved, it's a Distributed Denial of Service Attack.
4 0
4 years ago
Hy plzz help me friends​
timama [110]

Answer:

Ok so RAM is Random-Access-Memory.

RAM can store data just like in a hard drive - hdd or solid state drive - ssd

but the thing is that ram is really fast and data is only stored when RAM chips get power. On power loss your all data will be lost too.

ROM thanslates to Read-Only-Memory - so data in ROM chips can't be modifyed computer can just read the data but not write.

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware.

Have a great day.

Explanation:

3 0
3 years ago
Read 2 more answers
What technology will I use when I become a surgical technologist?
otez555 [7]

Explanation:

Preoperative: Sterile Hands

The surgical technologist is the first person to enter the OR before surgery. During this preoperative phase the surgical technologist adheres closely to the following routine:

Carefully dons his or her operating room attire, including scrubs

Begins to prepare and sterilize the room

Gathers all of the equipment and surgical tools that the surgery requires

Sterilizes, counts and carefully arranges them

The most important part of this preoperative phase is creating and maintaining the OR’s sterile environment. Sterile fields can be compromised in a variety of ways, the most common of which is by introducing moisture. To prevent this, the surgical technologist is responsible for arranging dry drapes around the operating table and keeping all surfaces in a sterile condition.

Intraoperative: The Third Hand

During the intraoperative phase of the surgery, surgical technologists are still responsible for maintaining the sterility of the OR, but they also effectively become a “third hand” to the surgeon and surgeon’s assistant during the procedure and perform the following tasks:

Help prepare medications and administer them to the patient

Assist in retracting tissues from the patient

Passes the surgical tools to the surgeon and surgical assistant during the operation

At any time during an operation, if a tool is missing or contaminated, the delay or resulting infection could cost a patient his or her life. That is why surgical technologists must be diligent and thorough at all times.

Postoperative: Tying Things Up

As the operation concludes, surgical techs are responsible for the following:

Counting all of the tools and instruments used during surgery to ensure that nothing is left behind in a patient

Suture the incision and apply disinfected dressings to the area

Dispose of items such as needles and gauze, and continue to maintain the OR’s sterile environment until the patient is sent to the recovery ward

Thinking-On-Your-Feet: Cell Phones in the OR

While surgical techs aren’t expected to work miracles, they must be able to think quickly on their feet in emergency situations. During a recent hospital blackout and emergency generator failure, one quick-thinking surgical tech, with the help of the patient’s family member, rounded up enough cell phones to illuminate the OR while surgeons completed an emergency appendectomy.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Pointers with classes a) A user-defined class named Timer has a constructor that takes two integer parameters to initialize hour
    14·1 answer
  • The search engine that makes it easy to find high-quality Web resources by combining Internet technology with traditional librar
    9·1 answer
  • Please help i really need to turn this in already
    6·1 answer
  • What are the pros and cons of using the internet in a medical office setting?
    7·1 answer
  • WILL GIVE BRAINLIEST
    14·2 answers
  • It is an electronic device that capable of accessing accepting processing product and storing data​
    13·1 answer
  • Create class SavingsAccount. Use a static variable annualInterestRate to store the annual interest rate for all account holders.
    11·1 answer
  • Write a program that will input temperatures for consecutive days. The program will store these values into an array and call a
    9·1 answer
  • Dana is reviewing a coworker’s presentation and wants to make note of some questionable data on a chart. What steps should she t
    5·2 answers
  • What is the typical drive letter for the hard drive?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!