1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pachacha [2.7K]
3 years ago
13

You find an artist's illustration on her web site that you want to use for a newspaper ad. This does not violate copyright laws,

as long as you
Computers and Technology
1 answer:
Greeley [361]3 years ago
3 0
As long as you cite the artist and website in your sorce page
You might be interested in
HELP! Identify the parts of the table. <br>A) Primary Key<br>B) Field<br>C) Record<br>D) Table<br>​
joja [24]

The primary key is the block under the Movie ID column.

The Field is the Movie Name.

The Record is the block that goes with the first row of data.

The Table is the bottom block in the center.

4 0
4 years ago
Read 2 more answers
A network administrator is reviewing a network design that uses a fixed configuration enterprise router that supports both LAN a
tester [92]

Answer:

a modular router

Explanation:

A modular router is a type of router that will provide multiple slots, this will enable the network engineer to either change or increase the number of space the router has.

A layer 3 switch cannot provide a WAN connectivity even though it can increase the number of ports on a router. The concept of PoE capability of any device have nothing to do with the number of ports it has. If the Engineer decides to use another fixed configuration router it will still lead to the same problem in the future because it cannot guarantee or provide the flexibility of future growth adaptation which can be given by a modular router if put in use.

8 0
3 years ago
There is no reason to study the works of famous photographers because they will make you less creative.
weeeeeb [17]
I think it is true because you may be ‘inspired’ by a famous artist but if you’re always being inspired by others its not 100% yours / you being creative
8 0
4 years ago
Read 2 more answers
_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
Sergeu [11.5K]

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

6 0
4 years ago
Which printout will result from the snippet of code?
Anna35 [415]

Answer:

These are the supplies in the list:  

[‘pencil’, ‘notebook’, ‘backpack’, ‘pen’, ‘calculator’]

Explanation:

The line return (\n) character will be in the output (so there will be a change of line), but it will NOT be visible as it would have been interpreted as a special character.

So the output will be on 2 different lines, with no \n visible.

If the command would have been: print('These are the supplies in the list:\n', supplies), with single quotes (') instead of double quotes (") then then \n would have been printed but not interpreted as a special character.  At least in most computer language.  Since we don't know of which language the question refers to, we can't be sure at 100%.

7 0
3 years ago
Other questions:
  • How do you think computers have helped to improve documentation, support and services within the healthcare industry.
    7·1 answer
  • Why does people that gets abused not report?
    5·1 answer
  • Energy is defined as stored energy
    13·2 answers
  • In 3 to 5 sentences, describe whether or not files should be deleted from your computer. Explain you answer.
    14·2 answers
  • NAND is logically complete. Use only NAND gates to constructgate-level circuits that compute the
    7·1 answer
  • Describe the process of sorting the following list using the above algorithm:
    7·1 answer
  • FOR DIGITAL DESIGN/ PHOTOGRAPHY
    5·2 answers
  • In 3-5 sentences describe whether or not files should be deleted from your computer explain your answer
    12·1 answer
  • Genres are useful for many reaseons. What are some explanations you can think of for how genres can be useful to players, game d
    5·1 answer
  • What is the internet​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!