1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
3 years ago
12

A provides legal protection for something an individual has created

Computers and Technology
1 answer:
il63 [147K]3 years ago
3 0
Your answer is : copyright
You might be interested in
Your friend is overspending and in need of a budget. What type of expense should they reduce next month?
dangina [55]
<span>The correct answer is to reduce the spending of going out to watch a movie with friends, since all of the other choices are a need and watching a movie with friends is just a want. One should learn how to prioritize one's needs before his or her wants.</span>
7 0
3 years ago
Read 2 more answers
The cell address ZZ123 means
mafiozo [28]
The range of cells from zz1 to zz23
7 0
3 years ago
Read 2 more answers
Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication
Serjik [45]

A device, usually external to a computer that is plugged into a computer's communication port or is connected wirelessly. Common peripherals are keyboards, mice, monitors, speakers, and printers

4 0
3 years ago
At what depth does an employer need to use a protection system to ensure the safety of workers in a trench or excavation?
nevsk [136]
Trench 4 foot or deeper and must be located 25 foot within eachother
3 0
3 years ago
Read 2 more answers
Im timed!!!!!!!!!!!!!!!!!!<br><br> I NEED HELP ASAP<br> THANK YOU SO MUCH
Troyanec [42]

Answer:

card sorting

Explanation:

tell me if im wrong...

6 0
3 years ago
Read 2 more answers
Other questions:
  • Plz answer and dont put a random thing for the points
    11·1 answer
  • What is a critique of the feature detector model of object recognition?​?
    8·1 answer
  • A ____ appears at the bottom of your e-mail messages and contains standard information about yourself that the recipient can use
    5·1 answer
  • Is ubisoft still making assassins creeds on xbox 360
    8·2 answers
  • Which feature enables you to make changes to all the slides of your presentation at the same time?
    15·2 answers
  • What formula would you enter to add the values in cells b4, b5, and b6?
    10·1 answer
  • . List 5 types of exploits from cybercrime and provide brief definition. (2.5 Marks)
    5·1 answer
  • Explain the history of computing device of mechanical era
    7·1 answer
  • The sequence of instructions performed to execute one program instruction
    12·1 answer
  • As you are discussing marketing with a client, you try to explain how individuals find sites. Which tool will you explain as the
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!