1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fofino [41]
4 years ago
8

Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new so

ftware game for the Wii. After completion of the project Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered ________.
A. Counterfeit softwareB. Pirated softwareC. Ethical softwareD. Governance software
Computers and Technology
1 answer:
kolezko [41]4 years ago
6 0

Answer: B)Pirated software

Explanation: A software that is copied or distributed to other sources without persisting the legal rights or acknowledgement of the owner.This act is considered illegal because a legal licences is required to do such activity.

Other options are incorrect because counterfeit software is the coping and distribution of software through means of CD or DVD in any organization, ethical software is made with the code of ethics and governance software is the set of policies that is used for governing software. Thus, the correct option is option(B).

You might be interested in
A firm uses BitLocker for volume encryption. Normally, BitLocker performs its task well. However, an administrator was recently
raketka [301]

Answer:

The BitLocker keys were compromised

Explanation:

Given that the act of decrypting and encrypting all over is a means of troubleshooting the issue of security in computing operations. Hence, when an administrator is forced to decrypt and encrypt the entire volume, the main reason for such action can be as a result of "BitLocker keys were compromised."

Hence, the right answer, in this case, is that "The BitLocker keys were compromised."

3 0
3 years ago
En que parte del mall del rio venden tarjetas de google play en cuenca​
JulijaS [17]

chxgfk hcyskvuct auhchovuzq vuvscisv

6 0
3 years ago
An interactive media professional would most likely help with
lapo4ka [179]
Interactive media specialists design web pages and other interactive computer applications for use in many different settings. Education requirements vary, but education in aspects of graphic design and in specific programs and programming languages is common.
5 0
4 years ago
Read 2 more answers
Define power supply and types of power supply<br>​
emmainna [20.7K]

Answer:

hope you like it

Explanation:

Two types of power supplies exist, DC-DC and AC-DC. DC-DC power supplies allow you to plug in electrical devices into car outlets or similar sources that supply direct current, or DC, power. These power supplies are not the most commonly used, though.

Classification of Power Supply and Its Different Types

OUTPUT = DC OUTPUT = AC

INPUT = AC Wall wart Bench power supplies Battery charger Isolation transformer Variable AC supply Frequency changer

INPUT = DC DC-DC converter Inverter Generator UPS

4 0
3 years ago
The contents of a four-bit register are initially 1011. The register is shifted six times to the right, with the serial input be
balu736 [363]

Answer:

First shift - 1101

Second shift - 0110

Third shift - 1011

Fourth shift - 1101

Fifth shift - 0110

Sixth shift - 1011

Explanation:

Each time you shift a register to the right, you do 3 things:  

  • The rightmost digit drops off
  • You move the next three digits over one position to the right
  • You fill in the leftmost position with one of the numbers from your serial input.

Contents are initially 1011.  The 1 on the right disappears.  The leftmost 3 digits (101) end up in the last 3 positions of the register.  The first position of the register takes a number from the serial input, which is 1 in this case.  So you end up with 1101.

Do this a second time.  The rightmost 1 is gone, the 110 end up as the last 3 positions of the register, and you end up with 0 in the leftmost position.  This one is 0110.

The remaining 4 follow the same pattern.

4 1
3 years ago
Other questions:
  • I Need an experienced or inspired game developer to answer these questions
    6·1 answer
  • All of the following are aspects of the search process except?
    5·2 answers
  • Why is it unlawful for an employer to refuse to employ someone based solely on their gender without evidence that such a charact
    9·1 answer
  • -How long does a copyright last?
    6·1 answer
  • A team is in the process of developing a motion picture. Currently, they are creating ideas for advertisements to make people in
    6·1 answer
  • What are the differences betweenCONS, LIST, and APPEND?
    5·1 answer
  • What intangible benefits might an organization obtain from the development of an
    5·2 answers
  • What is string literal in Java?
    5·1 answer
  • By itself, the human eye cannot see anything in three dimensions. What does the passage say enables us to see the world in 3-D?
    11·2 answers
  • True or false, the total number of clock cycles (cc) for a delay loop of 10 ms for 2-mhz 8086 clock is 10,000 cc.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!