1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madam [21]
3 years ago
5

List at least 4 types of works covered by copyright law

Computers and Technology
1 answer:
Shtirlitz [24]3 years ago
6 0

Answer:

musical works, dramatic works, literary works, sound recordings.

You might be interested in
Email, instant messaging and most web traffic go across the internet in the clear; that is, anyone who can capture that informat
solniwko [45]
Yes.  Originally ARPAnet (Advanced Research Projects Agency) was conceived as a network between large universities, the government, the military and government contractors. Basically a bunch of friends and aquaintences.  Security really wasn't a consideration until after ARPAnet was opened to the public.
8 0
4 years ago
Read 2 more answers
Which of the following is adoptable in Mindanao only?​
RUDIKE [14]

Answer:

there isnt any options

Explanation:

8 0
3 years ago
Why should you not perform any personal grooming task while driving?
VLD [36.1K]

Answer:

Drivers most capable of multitasking effectively are not those who are most likely to engage in multiple tasks simultaneously. Instead, people who score high on a test of actual multitasking ability tend not to multitask because they are better able to focus attention on the task at hand.

Explanation:

8 0
4 years ago
Read 2 more answers
describe briefly one scenario where records stored in a computer frequently need to be searched. state why the searches may be c
Gnoma [55]
Because the string is invalid or your source is not attached to your search engine.
4 0
3 years ago
Read 2 more answers
Which technology replaced the 64-bit front side bus and has 16 lanes for data packets?
skad [1K]
Idk how to do this to hahhahah
7 0
3 years ago
Other questions:
  • A (n) _____ exposure is a short term or brief exposure that may create an immediate health hazard
    9·1 answer
  • Write a program to assign distinct number between 1 and 200 into an int array of 100 elements in ascending order (you may reuse
    6·1 answer
  • Summarize the four critical issues for cyber warfare.
    6·1 answer
  • How do web bugs invade a person's privacy?
    7·1 answer
  • If a fuse block or holder has tree fuses, it may be termed a...
    7·1 answer
  • Write a flowchart and program that does the following: Asks the user for the average temperature in each of the last 12 months A
    12·1 answer
  • You have been given an encrypted copy of the Final exam study guide here, but how do you decrypt and read it???
    7·1 answer
  • What are the best legendary pokemon?
    15·2 answers
  • Select all steps in the list below that should be completed when using the problem-solving process discussed in this chapter.
    14·1 answer
  • Which device is used to direct the flow of data on a computer network?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!