1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
3 years ago
6

Classify the given items as belonging to the public domain or protected by copyright law.

Computers and Technology
2 answers:
irina1246 [14]3 years ago
6 0

Answer-A book published in 1758 can be classified as belonging to the public domain. According to U.S laws, works or creations published in the U.S before 1924 might be deemed expired.  

As a bloggers, when you hit the publish button, any work created is protected by copyright and the material inside is yours.

A music record from the 1960s - protected by copyright law

An infographic made by the federal government - public domain

A photograph taken in 1980 - protected by copyright law

max2010maxim [7]3 years ago
3 0

Anything protected by the copyright law has a legal concept that grants artists or authors control over their creations. On the other hand, anything in the public domain is not protected by intellectual property laws and the public owns these works.

A book published in 1758 can be classified as belonging to the public domain. According to U.S laws, works or creations published in the U.S before 1924 might be deemed expired.  

As a bloggers, when you hit the publish button, any work created is protected by copyright and the material inside is yours.

A music record from the 1960s - protected by copyright law

An infographic made by the federal government - public domain

A photograph taken in 1980 - protected by copyright law

You might be interested in
_____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.
sineoko [7]
Hello <span>Rfieldgrove1102 </span><span>

Answer: EDI enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.


Hope that helps
-Chris</span>
4 0
3 years ago
Pundits attributed Obama’s 2012 victory to which social media site?
maksim [4K]

twitter i think -----------------------------

5 0
3 years ago
Clearly explain with five differences between high level programming language, interpreted language and a machine language.
Anna11 [10]

Answer:

Execution Time, Memory storage,Readiability,

debugging,Platform independent

Explanation:

High level programming languages are the language which is user friendly languages. There is high level abstraction from internal machine code. Here we need compiler to translate that into machine code

Ex: C,c++,Java...

Interpreted languages are scripting languages where we need interpreter to interpret those scripts or commands

Ex:Python.Ruby

Machine languages are binary language which contains 0's and 1's can understandable by system only. Not human readable forma

Interpreted language scans each statement at a time and interprets that line by line. It takes less amount of time to analyze the source code but the overall execution time is slower.

High level language takes more memory than interpreted and machine as it generates some intermediate code

High level languages are more readable than remaining two

Intermediate languages are easy to debug as it executes line by line and when ever any error occurs in a particular line it stops and intimate there itself

High level and interpreted languages are platform dependent, it can work on some machine and OS specific configurations only

7 0
2 years ago
When you reboot your system, the computer follows start-up instructions stored in this type of memory. multiple choice dram sdra
MA_775_DIABLO [31]
<span>A computer’s start-up instructions are stored in a type of memory called Flash. Flash memory can be written to and read from, but its contents are not erased after the computer powers down. This Flash memory is more commonly referred to as the BIOS (Basic Input Output System).</span>
4 0
3 years ago
Read 2 more answers
What is a foreign key and how does it provide referential integrity?
Step2247 [10]

Answer:

By definition a foreign key of table A is a primary key of another table B, thereby establishing a link between them.

To provide referential integrity you can use these referential actions:

  • <u>Cascade:</u> If rows in table B are deleted, the matching foreign key columns in table A are deleted.
  • <u>Set Null:</u> If rows in table B are deleted, the matching foreign key columns in table A are set to null.
  • <u>Set Default:</u> If rows in table B are deleted, the matching foreign key columns in table A are set with the default value of the column.
  • <u>Restrict:</u> A value in table B cannot be deleted or updated while as it is referred to by a foreign key in table A.

4 0
3 years ago
Other questions:
  • A slightly tapered thread is characteristic of a _______ tap.
    15·1 answer
  • Which is a way that computer simulations of medicines could help reduce ethical issues in drug research? computer simulations co
    5·1 answer
  • Company ABC has always used passwords to protect the highly confidential information in their company. Recently, someone who was
    15·1 answer
  • What mass of nh3 can be made from 35g of n2?
    14·1 answer
  • In the retrieval phase of Godden and Baddeley (1975) study of the encoding specificity principle, participants were asked to sup
    9·1 answer
  • Which of the following is NOT an advantage to using inheritance?
    13·1 answer
  • As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki
    10·1 answer
  • HELP ME ASAP
    10·1 answer
  • What is a function of Agile software development?<br>​
    7·1 answer
  • How could an online college utilize enterprise software? A. Develop new technical support jobs B. Improve course resources and n
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!