1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
7

What should you do to protect your copyright

Computers and Technology
1 answer:
enot [183]3 years ago
5 0
The answer is Register your work
You might be interested in
I think these might be the answers but im not to sure, so am I right? or wrong? please help
mina [271]
Number 1 and 4 are the same? I agree with your answers.
4 0
3 years ago
Read 2 more answers
Coding question. Please help me?
Marizza181 [45]

Answer:

a  for a loop

Explanation:

7 0
3 years ago
Is it possible to build something that doesn't exist yet?
Anastasy [175]

Answer:

yes

Explanation:

how do u think other thing were built like when phones were first made

5 0
3 years ago
The students of a college have to create their assignment reports using a word processing program. Some of the questions in thei
ser-zykov [4K]

Answer:

Table function

Explanation:

The table function can also be used to compare between items. The items can be arranged in columns and the features tonbe compared can be placed in columns. With this one can make comparison between the items.

5 0
3 years ago
Hyper-v enables windows server 2008 to operate as a _____ server.
lianna [129]
 Answer: Virtual                                                                                                     <span>Hyper-V enables Windows Server 2008 to operate as a virtual server.</span>
3 0
3 years ago
Other questions:
  • Which button could Pamela press in the Microsoft Word spell checker to make the word “colour” instantly change to “color” whenev
    11·1 answer
  • Task1: #Define a function called show_students which takes 2 parameters students and message #Print out a message, and then the
    14·1 answer
  • landon starts his computer and gets message, hard drive is not found. He was watching a movie the previous night, what might the
    6·1 answer
  • In a cross-site request forgery, what components help send a forged HTTP request? In a cross-site request forgery, browser _____
    13·1 answer
  • How can computational thinking techniques be applied to software development
    6·1 answer
  • Adobe Indesign project 4 museum indesign file. The instructions are 70 pages long I cant sit still long enough to read them
    11·1 answer
  • It is common for people to name directories as dir1, dir2, and so on. When there are ten or more directories, the operating syst
    8·1 answer
  • Edhesive 6.8 lesson practice answers
    10·1 answer
  • Your program has a loop. You want to exit the loop completely if the user guesses the correct word.
    6·2 answers
  • Identify the places in the code where there are object-oriented concept violations, content coupling, common coupling, control c
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!