1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
3 years ago
11

Copyright Laws provide_______ for the owners of creative works.

Computers and Technology
1 answer:
viktelen [127]3 years ago
7 0
They provide protection
You might be interested in
write an expression taht evaluated to true if and only if the variable s does not contain the string 'end'
natima [27]

Answer:

//check which string is greater

if(strcmp(name1,name2)>0)

//assign name1 to first, if the

    //name1 is greater than name2

    first=name1;

else

    //assign name2 to first, if the

    //name2 is greater than name1

    first=name2;

5)

//compare name1 and name2

    if(strcmp(name1,name2)>0)

   

         //compare name1 and name3

         if(strcmp(name1,name3)>0)

       

             //assign name1 to max, becuase

             //name1 is greater than name2 and name3

             max=name1;

       

Explanation:

7 0
3 years ago
How do Hlookup and Vlookup differ?
german

HLOOKUP performs the same function as VLOOKUP, but looks up data that has been formatted by rows. HLOOKUP searches for a value in the top row of a table, and then returns a value in the same column from a row you specify in the table or array

6 0
3 years ago
Read 2 more answers
What are the keys in all rows that sit between the touch keys?
AysviL [449]
The keys in all rows that's sit between the touch keys are the stretch key
6 0
3 years ago
As we think of computer crime, there are ways in which thieves can steal your banking information through ATM machines. If you w
Travka [436]

Answer:NO, I WILL NOT GIVE THE TELEPHONE NUMBER

WHY?

IT IS A BREACH OF TRUST

IT IS A BREACH OF DATA PRIVACY

IT ALSO VIOLATES THE PRIVACY OF INFORMATION RIGHT OF THE GIRL.

Explanation:BREACH OF TRUST is act or actions taken against the signed agreement between a person and another party which may be any Organisation like a Financial Institution where the Financial Institution agrees not to release the personal Information about their customer without the person's consent.

IT IS A BREACH OF DATA PRIVACY many persons wants their data which are made available to Organisation to be kept private,divulging such information without the person's consent is a reach of data privacy.

It violates the privacy of Information right of the Girl, except for Security or other specified reasons no Organisations or person is given the right to divulge another person's right to a third party, ALL THESE VIOLATIONS ARE PUNISHABLE UNDER THE LAWS OF THE LAND.

4 0
3 years ago
Which is an example of a crime that might occur in an e-commerce transaction?
Zolol [24]

Answer:

A costumers credit card information is stolen and used by someone else.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What do work places allow a company to do
    12·1 answer
  • What are the 6 external parts of a computer
    14·1 answer
  • What is the magnitude of the largest positive value you can place in a bool? a char? an int? a float? a double??
    8·1 answer
  • Recall that through either photographic or computer technology, researchers can make a composite (or "averaged") face out of any
    11·1 answer
  • why does it not let me create a new account when i log out of this one and go to join now after i fill everything out it wont le
    11·1 answer
  • Your customer, Mykel, is ordering a custom-built computer for his home office and isn’t sure which components should be the high
    12·1 answer
  • The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate a
    11·1 answer
  • What is presentation
    15·2 answers
  • If your computer determines the destination address of a network packet is to a remote network.
    9·1 answer
  • Purpose In this lab activity, you will be introduced to the concept of enriching data with SPLUNK. This three-hour course is for
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!