1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
3 years ago
5

Can you use public domain images without violating copyright laws?

Computers and Technology
1 answer:
Oksana_A [137]3 years ago
3 0
There are no restrictions on using works that are in the public domain, which means you can use them however you want—short of claiming that you created them yourself.

Hope this helps
You might be interested in
The website of an international human rights organization stores a large database of information and provides search functionali
ValentinkaMS [17]

Answer:

False.

Explanation:

The website of an international human rights organization stores a large database of information and provides search functionality to make it easier for their visitors to locate desired information. However, this approach fails to be effective since the search functionality is limited to the website rather than the whole web is a False statement.

3 0
3 years ago
¿Cuál crees tú sea la finalidad de los virus informático, y porque son creados? ¿Cuáles son las precauciones y / o recomendacion
pantera1 [17]

Un virus informático es un tipo de programa de software malicioso ("malware") que, cuando se ejecuta, se replica modificando otros programas informáticos e insertando su propio código. Cuando esta replicación tiene éxito, se dice que las áreas afectadas están "infectadas" con un virus informático.

Un virus informático es un tipo de programa de software malicioso ("malware") que, cuando se ejecuta, se replica modificando otros programas informáticos e insertando su propio código. Cuando esta replicación tiene éxito, se dice que las áreas afectadas están "infectadas" con un virus informático.

lo mejor es mantener tu computadora actualizada

6 0
3 years ago
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore dam
dexar [7]

Answer:

The answer is "Recovery Plan for Disasters".

Explanation:

In the given statement, some of the information is missing, which can be described as follows:

A) systems engineering plan

B) security compliance plan

C) risk assessment plan

D) Recovery Plan for Disasters

It is a set of guidelines for the execution of a recovery process, it provides the restoration and safety to the system for the organization in the event of a disaster. It defined as "a detailed summary of the appropriate acts to be carried out before, during and after a disaster", and incorrect choices were explained as follows:

  • In option A, It is used to design and analyze complex systems.
  • In option B, It provides frameworks for the corporate evaluation process.
  • In option C, It is used to identify the problems.
6 0
3 years ago
What is the future of web development
Anna35 [415]

Answer:

Creating websites that can execute automated tasks and new programing languages revolving around web development.

Explanation:

7 0
2 years ago
For what purpose is IT used in business?
stealth61 [152]

Answer:

manufacturing

improving

customer care

transportation

human resource management

Explanation:

business communication use technology to improve their services or products as a way of gaining competitive advantage.

6 0
3 years ago
Other questions:
  • Which utility would you use to test communication on your own computer using your ip address as a parameter?
    10·1 answer
  • Need help this will affect my final grade in technology and the dead line has passed!!!
    11·1 answer
  • Yellow and blue light are projected on a white screen. what color will the screen appear to be?
    6·2 answers
  • A user of the wireless network is unable to gain access to the network. The symptoms are:1.) Unable to connect to both internal
    6·1 answer
  • 2. What type of expansion card allows your computer to
    12·1 answer
  • Write a recursive function that takes a non-negative integer as an argument and displays the same number in reverse order (i.e.
    15·1 answer
  • While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating
    8·1 answer
  • Which of the following are documents that can help you to review and assess your organization’s status and state of security? Fi
    6·1 answer
  • When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This adjustm
    13·1 answer
  • You need to know more than just facts in order to use critical thinking skills.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!