1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
12

Which activity constitutes legal computer activity?

Computers and Technology
1 answer:
Sveta_85 [38]3 years ago
3 0
c.

b\c it's copy write so you can download that but not a. b. or d.
You might be interested in
Explain three causes of repetitive strain injury (RSI)​
Tpy6a [65]
1. Typing on a computer for too long
2. Using a mouse for long periods
3. Holding the mouse incorrectly
Or 4. Working in a cramped workspace
4 0
3 years ago
By 1955, half of all U.S. households ________ had access to the internet. had satellite radio in at least one car. owned at leas
storchak [24]

Answer:

Owned at least one television.

Explanation:

Part among most of the U.S. families with at least 1 TV had internet connection in the year 1955.

Average American invests between two and a part to nearly several times in a day enjoying tv, based on the study as well as the period of the year. This was never only critical that such a period should be expended on tv however that it remains not wasted on other things, including studying or hanging out or making friends.

8 0
4 years ago
Which of the following is not a requirement of a linear programming problem?
vampirchik [111]

requirements of a linear programming problem, moderate

6 0
3 years ago
Discuss any five barries of integrating ict tools in education​
yawa3891 [41]

Answer:

lack of computer, lack of quality software, lack of time, lack of technical programs and lack of teachers

3 0
3 years ago
You have a client who writes "cookies" to help businesses target their largest group of interested customers by data mining pers
STatiana [176]
Hi!

The answer to this is True

You always want to transparent with how you are going to use someone's information and how you are going to keep it private.
3 0
3 years ago
Other questions:
  • Are the ways data is represented and transmitted with computers laws of nature or laws of man?
    10·1 answer
  • Which operator is used for quotient division in java​
    6·1 answer
  • You have just built a new system from scratch. you turn the computer on but the system boot fails and sounds a beep code. what m
    15·1 answer
  • Computer Works is a computer accessories manufacturer based in Brazil. All customers in South America pay the same freight charg
    15·1 answer
  • WILL UPVOTE ALL plz
    10·1 answer
  • When using a presentation software you can change the size of the text to...? Increase Font size, Decrease font size, increase t
    15·2 answers
  • Create one Python module: arithmetic which has two functions: add(x, y) and get_length(x). The description of two functions are
    7·1 answer
  • What goals do you set for yourself while studying?
    9·2 answers
  • Which of the following is not a data in python. float, integer, bool, str.​
    14·1 answer
  • PushBullet is an app to talk with people. Look it up and let me know u got it.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!