1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr Goodwill [35]
3 years ago
15

A company has recently learned of a person trying to obtain personal information of employees illegally. According to which act

will be the person punished?
A I-SPY

B CFAA

C Digital Millennium Act

D SOPA
Computers and Technology
2 answers:
Juli2301 [7.4K]3 years ago
7 0

Answer

Digital Millennium Act

Explanation

The Digital Millennium Copyright Act  is a United States copyright law that implements two  treaties of the World Intellectual Property Organization . The aim of this ACT is to protect the rights of both copyright owners and consumers. The law complies with the World Intellectual Property Organization  Copyright. The law has two basic functions. First, it protects copyright owners by providing them with a mechanism to enforce their rights without having to directly sue the infringer

Nostrana [21]3 years ago
7 0

Answer:

digital mileminum act

Explanation it only makes since

You might be interested in
Differences between placeholders and textbook in PowerPoint ​
Igoryamba

Answer:

fifthly, if it is an empty box. it disappear completely. sixth the size of a text box changes depending on the length of a text that we type . this is in contrast with a place holder box where changes are made of the font of the text

Explanation:

mark me a brainlist

4 0
3 years ago
Who is the father of computer​
Irina-Kira [14]

Answer:

Charles babbage is the father of computer

5 0
3 years ago
........ manages the function of all the hardware and other software used in the computer.
Ivenika [448]

Answer:

The answer to this question is given below is in the explanation section.

Explanation:

manages the function of all the hardware and other software used in the computer:

operating system is defined as a system software that manages computer hardware and software resources and provide common services for computers programs.All application software computer programs requires an operation system to  function. operating system controls computer hardware run the computer programs and organize file.

CPU:

central processing unit that bring the instruction from memory to be executed and decodes.

Storing device:

Any hardware that can hold information temporarily and permanently. we distinguish two type of storage: as primary storage device and a secondary storage device.

Example:

  1. Magnetic storage device:hard drive,floppy diskette etc.
  2. optical: Blu-ray disc,CD Rom disc.

Flash memory device:memory card memory sick,ssd

Hardware:

Hardware include the physical features,which are every part that you can either see or touch, for example monitor,case,keyboard,mouse and printer.

Software:

The part which activate the physical components called software. it includes the features that resposible for directing the work to the hardware.

8 0
3 years ago
An outliner is a tool to help manage data in a logical and hierarchical order.
Papessa [141]

Answer:

false

Explanation:

an outliner is a number way out of a number set aka a hue gap between numbers on a number line

5 0
3 years ago
Mobile legends new hero in october aamon will be released on The official server on october 26th
Ivanshal [37]

Answer:

Okay

Explanation:

5 0
3 years ago
Other questions:
  • You have compiled a new kernel using rpm. when you reboot, the new kernel is not the default selection on the boot menu. you use
    10·1 answer
  • Which of the following explains the growing need for a standard IT professional licensing program? Check all of the boxes that a
    11·1 answer
  • When the _____ logical operator is used to combine keywords, a search engine will retrieve all results containing either keyword
    7·2 answers
  • 25 pts! If programmers cannot write an algorithm because the problem is too complex, which methodology can they use to reach an
    14·1 answer
  • Which is a form of cyber bullying??
    9·1 answer
  • Which technology will a business use to figure out who accessed confidential files on a company's computer system
    12·1 answer
  • Write a method named printGPA that takes in as a parameter a Scanner to read in user input, and calculates a student's grade poi
    8·1 answer
  • Help please!! worth 10 pts! answer quick please!
    12·1 answer
  • What are the difference among the whole note, half note and quarter note ? (this is music)
    12·2 answers
  • . When you ____________________ a word, you can use a single line, a double lines, a dotted line, or even a wavy line!
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!