1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GaryK [48]
2 years ago
10

Read the following scenario and decide whether it is fair use and why Donnie has a major paper do for school he finds a great we

bsite covering the information online he cuts and paste sections to put into his report he doesn’t need a bibliography for the paper so he doesn’t include one is this fair use? A) no because he did not cite the source B) no because using information from websites for school project always violates fair use C) yes because he is using the website for educational purposes D) yes because he copied the source word for word
Computers and Technology
1 answer:
ss7ja [257]2 years ago
5 0

Answer:

(A) and (B) I'm leaning more towards (B)

Explanation:

You might be interested in
One of the most studied computational problems is the ordering of a collection of values. Ordering is important because many pro
andreyandreev [35.5K]

I think the order should be 2-1-3-4, but the description of step 1 is confusing. In selection sort, you iterate from the point of the marker down through the entire list and find the smallest value, and swap that with the value at the marker. Then you advance the marker and repeat the process on the remainder of the list.

7 0
3 years ago
A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at
erastova [34]

Answer:

The correct answer to the following question will be "DHCP server".

Explanation:

A network manager that dynamically supplies and delegates equipment of clients with their IP addresses, standard portals and some other networking specifications, known as DHCP server.

  • It depends on the standard operating procedure classified as Dynamic Host Configuration Protocol to answer to client-specific broadcasting commands.
  • It's used to optimize the authentication mechanism of computers on IP channels, enabling them using applications and services including NTP, DNS, and any UDP or TCP-based networking protocol.

Therefore, the DHCP server is the right answer.

7 0
2 years ago
CIST 1122 Project 2 Instructions
NikAS [45]

Answer:

it is suppost ro be at

least 20 tb

Explanation:

5 0
2 years ago
How does polymorphism enable you to program "in the general" rather than "in the specific"? Discuss the key advantages of progra
barxatty [35]

Answer:

Explanation:

When programming in an OOP language classes are created to represent real-life objects, people, places etc. from the real world. Programming in the general allows you to cut down your code and making it more efficient by applying the same necessary functions to all of the objects that classify under the same category. For example by programming "in the general" and creating an Animal class you can create all of the functions/behaviors that animals tend to have. Then you can apply these functions/behaviors to various animals such as a Cat, Dog, Horse, etc. But if you program in the specific you cannot apply a Cat class to a Dog since they are not the same thing.

4 0
2 years ago
What is a flowchart and write it's work​
Artist 52 [7]

Answer: A flowchart is a type of diagram that represents an algorithm, workflow or process. The flowchart shows the steps as boxes of various kinds, and their order by connecting the boxes with arrows. ... Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields.

Explanation: brainliest plz!

3 0
3 years ago
Other questions:
  • Jenny is going on a trip to wildlife safari with her friends. She wants a camera that will help her shoot fast-moving animals. W
    15·2 answers
  • Discussion group may have a___________ who monitors the postings and enforces the sides rules​
    13·1 answer
  • 1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
    6·1 answer
  • What authentication protocol is ticket-based and is used by windows computers that are members of an active directory domain?
    13·1 answer
  • A matrix representation stores matrices such that the offset address of the element in row i and column j can be calculated by c
    12·1 answer
  • The domain name service (dns is a distributed database that allows users to communicate with each other computers by:
    7·1 answer
  • The __________ method can determine whether a string contains a value that can be converted to a specific data type before it is
    12·1 answer
  • Convert each of the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement. Each of t
    8·1 answer
  • Suppose that a computer has three types of floating point operations: add, multiply, and divide. By performing optimizations to
    7·1 answer
  • Tom is not sure how to code contents such as title and meta elements. These are coded as ____ elements.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!