1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tester [92]
3 years ago
7

Which of the following cannot be copyrighted? a. books b. inventions c. videos d. music

Computers and Technology
1 answer:
natita [175]3 years ago
7 0
Well books, videos and music can all be copyrighted (I believe) so the logical answer would be b. inventions. Hope this helps.
You might be interested in
Give one (1) advantage and one(1) disadvantage of using and integrated software package over a custom written one.
Harrizon [31]

Answer:

See explanation

Explanation:

An Integrated software package is a kind of software package that combines various applications in just one program. It basically provides one spreadsheet, one word processing and database management. A good example is the Microsoft Office.

A custom written software package on the other hand is the type that is specially created for a particular business. It is created to meet the client's specifications and preferences.

An advantage of using integrated software is the low cost and fast deployment. Integrated software packages are relatively affordable and easy to acquire unlike that custom based ones that take time to create.

A disadvantage of the integrated software is the lack of control and flexibility. Because it is an integrated software package, you have no control over how it is built and on the long run their updates may not be what you want. And unlike the Custom written one, you cannot tell the developers to add or remove features that suit your needs.

7 0
3 years ago
. In many instances an IP address is used to access a server rather than a URL because a URL is more difficult to set up and eas
Sloan [31]

Answer:

IP's allow for anyone to have direct connection to the Server including attackers, I'd say that this is false primarily because setting up a domain being too "hard" isn't a reason to cop out on security

Explanation:

5 0
3 years ago
Write a program for Horizon Phones, a provider of cellular phone service. Prompt a user for maximum monthly values for talk minu
Anarel [89]

Answer:

mport java.util.Scanner;

public class CellPhoneService

{

    public static void main (String args[])

    {

         Scanner sc=new Scanner(System.in);

         System.out.println("Enter the Talk minutes");

         int talkmin=sc.nextInt();

         System.out.println("Enter the text message");

         int textmsg=sc.nextInt();

         System.out.println("Enter the Gigabyte Data");

         int gbdata=sc.nextInt();

         if(talkmin<500 && textmsg==0 && gbdata==0)

         System.out.println("PLAN A IS RECOMMENDED FOR THIS USER at 49$ per month");

         else if(talkmin<500 && textmsg>0 && gbdata==0)

         {

              System.out.println("PLAN B IS RECOMMENDED FOR THIS USER at 55$ permonth");

         }

         else if(talkmin>=500 && textmsg<100 && gbdata==0)

         {

              System.out.println("PLAN C IS RECOMMENDED FOR THIS USER at 61$ permonth");

         }

         else if(talkmin>=500 && textmsg>=100 && gbdata==0)

         {

              System.out.println("PLAN D IS RECOMMENDED FOR THIS USER at 70$ permonth");

         }

         else if(gbdata>0 && gbdata<2)

         {

              System.out.println("PLAN E IS RECOMMENDED FOR THIS USER at 79$ permonth");

         }

         else if(gbdata>=2)

         {

              System.out.println("PLAN F IS RECOMMENDED FOR THIS USER at 87$ permonth");

         }

    }

}

Explanation:

  • Take the talk minute and text message as input from user.  
  • Apply the conditional statement to check if talk minute is less than 500 along with text message and GB data having a value 0.
  • At last check if GB data is greater than or equal to 2, then print the relevant response.
3 0
3 years ago
Vlad is the leader of a group; he receives most of the messages from the group members, and he provides most of the information
LekaFEV [45]

Answer:

<u><em>Wheel </em></u>network

Explanation:

A wheel network <em>is a communication style in which the leader is the only one to receive or communicate.</em>

The leader, generally the business's manager or owner, is like the bright light in the middle of a Ferris wheel; the light starts in the middle and then passes on to all the spokes at the wheel's ends.

The one individual needs to understand everything about the company and to deliver all communications. Staff have a clear idea of how to make decisions and how to manage interaction.

6 0
3 years ago
What is the best resource to learn python?
7nadin3 [17]

Answer:

prolly a snake expert

Explanation:

they know snakes

4 0
2 years ago
Read 2 more answers
Other questions:
  • which of the following is true about both the cyber community and the real community like the one you live in,i will give 10 poi
    6·1 answer
  • What is the other name of the horizontal column graph?
    6·2 answers
  • What does that program print out?<br><br> a) 2<br> b) 3<br> c) 4<br> d) 8
    14·2 answers
  • Which of the following are not parts of a message? Select all that apply.
    12·1 answer
  • Identify which statement explains why a programmer would break a logic problem into steps.
    13·2 answers
  • What is emerging as a major business area of innovation that offers a flexible collection of computers on the internet that can
    6·1 answer
  • The _____ of a local variable is the function in which the variable is created.
    6·1 answer
  • 1. why is manufacturing considered the biggest contributor to progress
    9·1 answer
  • ________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
    12·1 answer
  • I need to send this in ASAP
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!