1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leonid [27]
3 years ago
11

WILL MARK BRAINLIEST THIS IS ALL MY POINTS AND I ALREADY ASKED THIS QUESTION AND IF YOU ANSWER IT AGAING YOU WILL GET MORE POINT

S NEED HELP ASAP!!!!
A ______ is a type of legal protection for which person can apply to protect an invention or a discovery.
Computers and Technology
1 answer:
dezoksy [38]3 years ago
8 0

Answer:

A <u>patent</u> is a type of legal protection for which person can apply to protect an invention or a discovery.

Explanation:

Invention  will be the solution of some technical problem or discovery recognizing something first time that is already exist , that can be unique from other solutions. These innovations and discovery are protected to secure the interest of the inventor. A legal term is used to protect the invention or discovery is known as patent.

Whenever some one invent or discover a new thing he will secure his interest through Patent protect.

You might be interested in
________ is an open-source program supported by the Apache Foundation that manages thousands of computers and implements MapRedu
coldgirl [10]

Answer:

Hadoop.

Explanation:

Apache Hadoop:- Supported by Apache foundation it is an open-source framework created for processing very large data sets.

Apache Hadoop consists of components including:

MapReduce for parallel processing.

(HDFS) Hadoop Distributed File System.

Yarn for cluster resource managementand job scheduling.

Common libraries needed by the other Hadoop subsystems.

5 0
4 years ago
We made a distinction between the forwarding function and the routing function performed in the network layer. What are the key
VladimirAG [237]

Answer: forwarding: move packets from router's input to appropriate router output

routing: determine route taken by packets from source to destination

Explanation:

The network layer refers to where connections take place in the internet communication process by sending packets of data between different networks.

The distinction between the forwarding function and the routing function performed in the network layer is that the forwarding function move packets from the input of the router to the appropriate router output while the routing function:m helps in knowing the routee taken by packets from the source to destination.

6 0
3 years ago
Does coaxial cable use radio waves to transmit data
Elan Coil [88]
Coaxial cable<span>, or </span>coax<span> (pronounced </span><span>/<span>ˈkoʊ.æks</span>/</span><span>), is a type of </span>cable<span> that has an inner conductor surrounded by a tubular insulating layer, surrounded by a tubular conducting shield. Many coaxial cables also have an insulating outer sheath or jacket. The term </span>coaxial<span> comes from the inner conductor and the outer shield sharing a geometric axis. Coaxial cable was invented by English engineer and mathematician </span>Oliver Heaviside, who patented the design in 1880.[1]<span> Coaxial cable differs from other </span>shielded cable<span> used for carrying lower-frequency signals, in that the dimensions of the cable are controlled to give a precise, constant conductor spacing, which is needed for it to function efficiently as a </span>transmission line<span>.</span>
5 0
3 years ago
Read 2 more answers
Why is it a good idea to view your HTML code in more than one web browser
Mandarinka [93]

Because some features may not be available on some browsers. By viewing it on different browsers, we can see if there's any incompatibilities and fix them.

5 0
3 years ago
You select a database or change to a different database with the ____ function.
saw5 [17]
The USE statement switches to a different database.
8 0
3 years ago
Other questions:
  • Algorithm for converting decimal into binary.
    7·1 answer
  • The final element of an e-mail message should be
    15·1 answer
  • A disadvantage of a bus network is that _____. a. failure in one workstation necessarily affects other workstations on the netwo
    7·1 answer
  • Use the following global structure declaration as an example only. You will need to create your own data structure based on a da
    5·1 answer
  • To defragment a disk means to ____. slow it down, diagnose problems with it, reorganize it, repair it
    8·1 answer
  • A program needs to allow a customer to input integers until the input number is zero. When the input number is zero, the program
    14·1 answer
  • R6. Suppose N people want to communicate with each of N - 1 other peo- ple using symmetric key encryption. All communication bet
    13·1 answer
  • PLS HELP ASAP!! which of these would be easier to do in a database program than a spreadsheet program? check all of the boxes th
    5·2 answers
  • Where would you click to see the list of microsoft word styles?
    15·1 answer
  • Examples of how the development of coding changed the way we live. What type of technology was created as a result of code?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!