1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madam [21]
3 years ago
5

List at least 4 types of works covered by copyright law

Computers and Technology
1 answer:
Shtirlitz [24]3 years ago
6 0

Answer:

musical works, dramatic works, literary works, sound recordings.

You might be interested in
What is the first step in creating a maintenance ?
tankabanditka [31]
The first step would be knowing the manufacturer s recommended schedule for maintenance
7 0
3 years ago
The GaVS resource where students can locate information regarding Canvas, student email, registration and O365 is called the: St
wariber [46]

I Inferred you are referring to the Georgia Virtual School resource program.

<u>Answer:</u>

<u>Guidance Center</u>

<u>Explanation:</u>

Interestingly, the Georgia Virtual School (GaVS) enables students access to Virtual education.

Their resource platform allows students to find information regarding Canvas, student email, registration and Office 365 etc by simply going Guidance Center.

7 0
3 years ago
What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system
pashok25 [27]

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

3 0
3 years ago
Implementing multiple types of technology and thereby precluding that the failure of one system will compromise the security of
Setler79 [48]

Answer:

Redundancy

Explanation:

  • There are several redundant computer systems that can be applied to various operating systems and platforms.
  •  In any case, a server usually has redundant components, disks, network cards and power supplies.
  • The servers usually have two network cards with data redundancy, so in case of failure we will always have one of them available.
  • In conclusion, data redundancy is a fundamental system for the correct storage of the data available in the database.
5 0
3 years ago
An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours, plus any overtime pay. Ov
LuckyWell [14K]

Answer:

Assuming this is Python, I would do something like the following:

Explanation:

hourWage= float(input ("What is your hourly wage?: "))

regularHours= float(input ("How many regular hours did you work this week?: "))

overtimeHours= float(input ("How many overtime hours did you have this week?: "))

overtimeWage= (1.5*hourWage)

totalWeeklyPay= (hourWage*regularHours)+(overtimeHours*overtimeWage)

print= ("Your total weekly pay is: " ,totalWeeklyPay)

I hope this works!

8 0
3 years ago
Other questions:
  • Peak download rate for a 4g network is __________. select one:
    12·2 answers
  • You have no control over who views your social network information
    13·2 answers
  • Using an array, double each of the following values and print each result: values = [1.1, 10, 4.55, 30004, 0.2]
    7·1 answer
  • Which of the following identifies the patterns used for each data series in a chart?
    13·1 answer
  • Another html/css assignment, drop css code below, thank you
    15·1 answer
  • How much electricity is in the human brain? ​
    8·2 answers
  • Your employer is opening a new location, and the IT director has assigned you the task of calculating the subnet numbers for the
    14·1 answer
  • Computer networks allow computers to send information to each other. What is the term used to describe the basic unit of data pa
    14·1 answer
  • Describe at least one issue of terrorism that has happened recently.
    14·1 answer
  • How does polymorphism enable you to program "in the general" rather than "in the specific"? Discuss the key advantages of progra
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!