1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iogann1982 [59]
3 years ago
12

Can you please answer these questions for me: Is it illegal to copyright? What does it mean to get copyrighted? What are example

s of copyright? How do you get a copyright?
Computers and Technology
2 answers:
Alenkinab [10]3 years ago
5 0

yes it is illegal to copyright your not supposed to take somebodies work and claim it as your own. Some examples of works eligible for copyright protection are: Literary, musical, graphic, and sculptural works; Motion pictures and other audio-visual works; Derivatives of protected works, such as a sequel (i.e. the Star Wars movies); Original compilations of facts, such as a field guide.

Ensure your work is properly marked.

A correctly worded notice will deter infringement, as it states that the work is protected under law.

Although a copyright notice is not required, (work is automatically subject to copyright protection under law), displaying a notice shows that you have an awareness of copyright and take infringements of your work seriously.

For information on how to word your notice, please see our fact sheet P-03: Using copyright notices.

Register your work.

If your work is infringed and your claim to copyright is disputed (i.e. in a plagiarism case - where the other party claims the work is theirs), you may need evidence to help prove your claim.

This valuable evidence can be provided by our copyright registration service that provides verifiable proof of the date and content of your work. As specialists in this area, we ensure that you have the very best evidence to support your rights, while our service policies ensure that the evidence is always available when you need it.

For information on registration, please see our fact sheet P-04: Registering copyright work.

Keep or register supporting evidence.

Supporting evidence falls into two categories:

Evolution of ideas

This is evidence of the progression of the work. Early drafts, synopsis, rough recordings, sketches, etc. are all evidence that the work progressed over time, rather than being copied from elsewhere. Although it is possible to fake such evidence, it is often time consuming to do so, so it can be fairly good evidence to demonstrate that you created the work from scratch over a period of time.

Footprints or watermarking

This is normally evidence inserted into finished documents that will identify the author in some way, such as deliberate mistakes, or hidden data that can be read using special applications.

For more details see our page on supporting evidence.

Agreement between co-authors.

If your work is a joint venture, be sure you know exactly where you stand, who will own what rights, and what happens when someone leave.

aleksley [76]3 years ago
4 0
Yes. Copying someone’s work. Claiming an YouTube music video. You can get copyrighted if you are using someone’s work without permission.
You might be interested in
GIVING BRAINLIEST
irakobra [83]

Answer:

A: Radio waves.

Explanation:

Computers use short-wave radio in order to communicate with devices in it's immediate vicinity.

8 0
2 years ago
Write a function `has_more_zs` to determine which of two strings contains # more instances of the letter "z". It should take as
nekit [7.7K]

Answer:

// Method's name: has_more_zs

// Parameters are text1 and text2 to hold the two phrases to be tested

public static String has_more_zs(String text1, String text2) {

 // Create and initialize z1 to zero

 // Use z1 to count the number of zs in text1

 int z1 = 0;

 // Create and initialize z2 to zero

 // Use z2 to count the number of zs in text2

 int z2 = 0;

 

 //Create a loop to cycle through the characters in text1

 //Increment z1 by one if the current character is a 'z'

 int i = 0;

 while (i < text1.length()) {

  if (text1.charAt(i) == 'z' || text1.charAt(i) == 'Z') {

   z1 += 1;

  }

  i++;

 }

 //Create a loop to cycle through the characters in text2

 //Increment z2 by one if the current character is a 'z'

 

 i = 0; //Re-initialize i to zero

 

 while (i < text2.length()) {

  if (text2.charAt(i) == 'z' || text2.charAt(i) == 'Z') {

   z2 += 1;

  }

  i++;

 }

 

 

 //Using the values of z1 and z2, return the necessary statements

 if (z1 > z2) {

  return "The phrase '" + text1 + "'" + " has more occurences of z than the phrase " + "'" + text2 + "'";

 }

 else if (z1 < z1) {

  return "The phrase '" + text2 + "'" + " has more occurences of z than the phrase " + "'" + text1 + "'";

 }

 else if (z1 == z2) {

  return "The strings have the same number of z";

 }

 else {

  return "Neither string contains the the letter z";

 }

}

Explanation:

Explanation to answer has been given in the code as comments. Please refer to the comments for the details of the code.

The source code file has been attached to this response and saved as "NumberOfZs.java"

Hope this helps!

Download java
5 0
3 years ago
Explain why living things store energy in lipids instead of in carbohydrates
Vedmedyk [2.9K]
Lipids are fat and carbohydrates are used to provide your body with energy so they are always being used
7 0
3 years ago
Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices
Kipish [7]

Disk encryption is highly risky response.

<u>Explanation:</u>

To protect or loss of serial data loss on mobile devices it is not advisable to implement full disk encrypted. Once full disk encrypted is implemented mobile access is very slow. End-user will complain to IT administrator.

Best solution either removes unwanted or unauthorized application from mobile to protect the data loss. Install antivirus program in each mobile.

Access or permission to application is removed so that mobile data loss can be avoided.  End user should also be advised not to click on any link which they receive through SMS messages or other through any applications.

5 0
4 years ago
How do design elements and color work together on a web page?
KiRa [710]

Answer:

The answer I believe is: 2. Both Enhance visual appeal.

Explanation:

4 0
3 years ago
Other questions:
  • What is wearable technology? Provide at least one example
    13·2 answers
  • Ziffcorp, an it firm, uses a technology that automatically updates the antivirus software in all the computers in the firm whene
    13·1 answer
  • We want to construct a memory with 256 bytes in capacity. Assume that each byte has a unique address. (a) How many address lines
    14·1 answer
  • How do I get more points?
    13·2 answers
  • Using a caesar cypher with an offset of three characters (a -&gt; d, b -&gt;e, ...., z -&gt; c), what would be the correct cyphe
    6·1 answer
  • Please answer this correctly what’s the answer opening modify style dialog box enables you to
    8·1 answer
  • Any device that uses light to read and write information.
    9·2 answers
  • An analogue sensor has a bandwidth which extends from very low frequencies up to a maximum of 14.5 kHz. Using the Sampling Theor
    9·2 answers
  • What will help the programmer understand what’s going on in the program?
    12·1 answer
  • Which device is used to direct the flow of data on a computer network?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!