1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
7

Eric uses a program where he “rips” (downloads) movies and then sells them to his friends. What Eric is doing is called

Computers and Technology
1 answer:
stepladder [879]3 years ago
8 0

Answer:

Probably considered pirating

Explanation:

you didn't give answer choices so this is just what it sounds like there doing

You might be interested in
In this scenario, what is the importance of anti-virus software and other similar virus protection programs?
Svetradugi [14.3K]
To protect my computer form hacking and save my files
3 0
3 years ago
What is the full form of html​
zepelin [54]

Answer:

Hypertext Markup Language

Explanation:

Hypertext Markup Language

5 0
2 years ago
Read 2 more answers
Give me 5 examples of Cyber Security
Vera_Pavlovna [14]

Answer:

Firewalls, Antiviruses, Malware, Antispyware,

Explanation:

8 0
3 years ago
Mary needs to choose the menu in order to place the text in a desired fashion around the image.
n200080 [17]
Can you be more specific?

7 0
4 years ago
Read 2 more answers
One concern some users have about storing data or accessing applications in the cloud is .
andriy [413]

Answer:

Explanation:

Security is the primary concern about cloud computing. This is the main for many IT departments to refrain from using cloud computing. Some things that put the security of cloud computing to be concerned are: Theft or loss of intellectual property.

3 0
3 years ago
Other questions:
  • What is are example of an engineered item?
    12·1 answer
  • If you think a query is misspelled, which of the following should you do?
    15·1 answer
  • Which of the following is not an element of the modified block style?
    7·2 answers
  • The key schedule results in generating multiple keys from the one secret key. These multiple keys are used:
    9·1 answer
  • WHAT IS A GOOD APP FOR REMOVING VIRUSES AND IT YOU DONT HAVE TO PAY MUCH FOR IT ????? PLEASE HELP ME
    8·2 answers
  • The price of an item you want to buy is given in dollars and cents. You pay for it in cash by giving the clerk d dollars and c c
    6·1 answer
  • What's the difference between joystick and mouse​
    10·2 answers
  • Can anyone suggest me any good complete isekai anime..​
    14·2 answers
  • How many MB are there in 1000 KB?
    11·2 answers
  • Fiona was talking to her colleagues about how advancements in digital technology had a negative effect on her life. Which aspect
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!