1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darya [45]
3 years ago
15

Fair use allows individuals to break copyright so long as they ________.

Computers and Technology
1 answer:
Iteru [2.4K]3 years ago
4 0
Can prove they are not infringing on copyright
You might be interested in
The physical parts or components of a computer system is called .
dmitriy555 [2]
Answer:
Motherboard

Explanation:
Motherboard is the main component of a computer. It connects with other parts of the computer including drive disks, RAM and CPU and any other expansion slots :)

(Hope it helped)
4 0
3 years ago
Which of the following that can be use read cookies in PHP?
iris [78.8K]

Answer:

a. $_COOKIE

Explanation:

$_COOKIE represents an associative array of Cookie name and value in PHP. For example in the code below we use the $_COOKIE construct to read the value of a cookie called 'testcookie' provided it has already been set.

<html>

<body>

<?php

if(!isset($_COOKIE["testcookie"])) {

   echo "Cookie 'testcookie' is not defined!";

} else {

   echo "Value of 'testcookie' is: " . $_COOKIE["testcookie"];

}

?>

</body>

</html>

8 0
3 years ago
Given the following code segment, how can you best describe its behavior? i ← 1 FOR EACH x IN list { REMOVE(list, i) random ← RA
garik1379 [7]

Answer:

Well, this code would box the whole body of an html document. by using the relative value for position, you are telling it to position relative to its normal position, which the top left corner is at (0,0). by using left: 50px, you are telling the box to set the left margin edge to 50px and by using top: 50px, you are telling it to set the top margin edge to 50px. by doing this shifting, the top left corner of the box, which is at (0,0) would be positioned at (50,50)

6 0
3 years ago
1. Write a static method named computeOddSum that is passed an array of int's named numbers. The method must compute and return
S_A_V [24]

Answer:

The method in Java is as follows:

public static int computeOddSum(int [] myarray){

       int oddsum = 0;

       for(int i=0; i<myarray.length; i++ ) {

        if(myarray[i]%2==1) {

           oddsum+=myarray[i];

        }

     }

     return oddsum;

   }

Explanation:

This defines the static method

public static int computeOddSum(int [] myarray){

This initializes oddsum to 0

       int oddsum = 0;

This iterates through the array

       for(int i=0; i<myarray.length; i++ ) {

This checks for odd number

        if(myarray[i]%2==1) {

The odd numbers are added, here

           oddsum+=myarray[i];

        }

     }

This returns the calculated sum of odd numbers

     return oddsum;

   }

To call the method from main, use:

<em>int [] myarray = {3, 10, 11, 2, 6, 9, 5};</em>

<em>      System.out.println("Odd sum = " + computeOddSum(myarray));</em>

5 0
2 years ago
Learning Task 5. Identify the terms being described below. Write your answer in your answer
Charra [1.4K]

Answer:

1. Waste management.

2. Substitution.

3. Personal hygiene practices.

4. Emergency preparedness.

5. Elimination.

6. Flammability limit.

7. Occupational safety and health (OSH).

8. Engineering controls.

9. Personal protective equipment (PPE).

10. Administrative controls.

Explanation:

1. <u>Waste management</u>: this refers to the collection, transportation, processing or disposal, managing and monitoring of waste materials.

2. <u>Substitution</u>: this refers to the hazard control which involves the measure of replacing one hazardous agent or work process with less dangerous one.

3. <u>Personal hygiene practices</u>: a very important method of controlling hazards which involves proper washing of your hair, skin, body and even your clothes.

4. <u>Emergency preparedness</u>: this refers to the preparedness for the first and immediate response in case of any type of emergency.

5. <u>Elimination</u>: this hazard control refers to the removal of a specific hazard or hazardous work process.

6. <u>Flammability limit</u>: is the term used to call the range of concentration over which a flammable vapor mixed with air will flash or explode if an ignition is present.

7. <u>Occupational safety and health (OSH)</u>: a cross-disciplinary area concerned with protecting the safety, health and welfare of people engaged in work or employment.

8. <u>Engineering controls</u>: the term used in hazard control which involves changing a piece of machinery or work process.

9. <u>Personal protective equipment (PPE)</u>: the term used to call any piece of equipment which is used to protect the different parts of the body such as ears and eyes such as respirators, face mask, face shield, gloves, boots, etcetera.

10. <u>Administrative controls</u>: this is a form of hazard control which involves manipulation of worker/employee’s schedule and job rotation.

7 0
3 years ago
Other questions:
  • Which is the most efficient way to italicize a row of text in every worksheet in a workbook?
    8·1 answer
  • Write the importance of cyber law? In point .<br>​
    10·2 answers
  • Gemima wants to show the amount of vitamin C a fruit salad contains in the blue cell of the table below. To do this, she needs t
    9·2 answers
  • Piers wants to take a course on XML. He is a certified web designer,but he has not used XML before. How can he use XML to improv
    8·1 answer
  • Match the organelles to their functions.
    6·1 answer
  • Determine the number of character comparisons made by the brute-force algorithm in searching for the pattern GANDHI in the text
    7·1 answer
  • Don't Answer If You Are Going To Give Me a Link! DON'T WASTE MY POINTS!
    12·1 answer
  • 1 point
    13·1 answer
  • Name four successful conversions to an electronic health record system in a medical facility
    6·1 answer
  • What are three ways of verifying legitimate right of access to a computer system?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!