1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xenn [34]
3 years ago
7

Which of the following us considered to be intellectual property? Picturez or images on the internet, books, computers. Ortennis

shoes
Computers and Technology
1 answer:
klasskru [66]3 years ago
4 0
Intellectual property is anything that has been designed, technically all of the above is a form of intellectual property. If only one answer is possible, I believe the best choice is images on the internet.

Speaking for the rest however, literary work is created and therefore the book is as well. Computers are designed so the specifications and design plans are also intellectual property. Same goes for the shoes
You might be interested in
What is netbeans and what is it for??
egoroff_w [7]

Answer:

NetBeans is an open-source integrated development environment (IDE) for developing with Java, PHP, C++, and other programming languages. NetBeans is also referred to as a platform of modular components used for developing Java desktop applications.

Explanation:

I know

4 0
3 years ago
Describe the difference between the while loop and the do-while loop.
Karo-lina-s [1.5K]

Answer:

The difference between While loop and Do - While loop are explained below.

Explanation:

  • While loop : It is a looping procedure in which the statements inside the while loop are executed depending on the condition outside the while before starting the loop.
  • If the condition is true then the code inside loop is executed otherwise not.
  • Do - While loop:  It is a looping procedure in which the statements inside the loop get executed and then the condition at the end of the loop is checked.
  • This means even the condition is fails the statements inside the loop are executed once.
  • Do while loop name itself suggests that "do the while and then check the condition".  
7 0
3 years ago
Liam noticed someone had accessed his social media account and made several posts without his knowledge. Which of the following
jok3333 [9.3K]

Answer:

Liam could

1) Change the password

Be sure to change the password to a "strong" one (containing lots of characters, numbers, symbols) so that way the password would be difficult to guess.

2) Avoid logging onto social media on public computers or WiFi connections.

Using public WiFi leaves you vulnerable to someone accessing your information through Internet traffic. If you do use public computers, just make sure to log out.

3) Avoid giving out account information to friends and avoid opening suspicious links and emails.

Opening suspicious links or emails could allow malware to infect your computer the moment you open them. Friends can unknowingly share these links that are designed to steal information.

I hope this helped <3 please lmk if there's anything more to add.

4 0
3 years ago
Averigua las diferentes intensidades, la potencia total y el gasto en € (de un mes de 30 días con el equipo conectado todo el ti
Naily [24]

<u>Explanation</u>:

<u>Here's what the question entails in clearer detail;</u>

Find out the different intensities, the total power and the cost in € (from a 30-day month with the equipment connected all the time) in the following case: Component Voltage (V) Power (P) CPU 0.95 V 27.97 W RAM 1,257 V 2.96 W Graphics Card 3.28 V 75.3 W HDD 5.02 V 19.3 W Fans 12.02 V 2.48 W Motherboard 3.41 V 18.3 W

7 0
3 years ago
Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization th
Dmitriy789 [7]

Answer:

The correct answer to the following question will be Option B (Policy).

Explanation:

  • The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.
  • Policies are usually implemented by the governing body throughout the corporation.
  • It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.

Therefore, Option B is the right answer.

7 0
3 years ago
Other questions:
  • The n modifier after the tilde forces the index variable to expand only to the ______
    15·1 answer
  • All ofthe following are correct EXCEPT one option when it comes towriting disappointing news letters. Identify theexception.
    6·1 answer
  • In cell h15 enter a vlookup function to determine the 2018 percentage of total attendance for the city listed in cell h14. Use t
    7·1 answer
  • Which of the following consists of electronic components that store instructions?
    10·1 answer
  • Which part is the author’s address?
    5·1 answer
  • You are working in the media industry, and you have created a web application where users will be able to upload photos they cre
    5·2 answers
  • State whether true or false.
    6·1 answer
  • The force required to slide an object is equal to _____.
    13·1 answer
  • When adjusting the aperture, an F-stop of F32 lets in more light then a setting of F8
    10·1 answer
  • Check all that apply to Raster Graphics
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!