1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tasya [4]
4 years ago
11

Your grandmother was an established artist and left you several original paintings after she died. Which of these statements is

TRUE? Copyright protection last for the life of the artist plus seventy years. Copyright protection lasts for the life of the artist Copyright protection lasts forever
Computers and Technology
1 answer:
Andreyy894 years ago
7 0
it's the first one, lasts for life plus 70 years.
You might be interested in
Suppose that cells B1 through B100 of an Excel spreadsheet contain the quantity of units ordered on each of 100 different days.
11111nata11111 [884]

Answer:

The "a" Option is correct.

Explanation:

The "COUNTIF" function counts every cell that, given a condition (value), suits into it. As you want to know the number of cells that contain a value of at least 50, the condition must be properly written to get the correct answer. Unless it is a cell value (e.g. B3), the condition must always be written with quotes (""). So, the options b and c are automatically discarded.

The d option appears to be correct, but it's not. If the condition is written ">50", the function will count every cell with a value above 50. But we're searching values at least (including) 50. So the correct answer is the a option.

7 0
3 years ago
Ethan is a project manager who is responsible for overseeing overall budget and schedule. Which tool is he is MOST likely to use
pashok25 [27]

Explanation:

55fhfhsgghzmjfgjkosh gyspfwfogywswgiwzy

8 0
3 years ago
How does having weak security on your browser represent the weakest link in a network
kozerog [31]

Answer:

1. Your location is always exposed "might not be a problem, until it is"

2. Computer Viruses as your browser allows them

3. Hackers, of course, Ransomware attacks

4. SpyWares, read terms and condition or atleast visit trusted sources

5. Phishing, intermediatte security can handle this risk, but fatal if not. as in online identity stolen, bank accounts accessed.

6...... ALWAYS STAY SECURED

YOU WERE NEVER THE TARGET, JUST THE VICTIM

5 0
3 years ago
Free Write Friday 2/26/21
Bad White [126]
Write about art bc thags always so cool
4 0
3 years ago
Suppose that a function dynamically allocates a block of memory with a local pointer variable p pointing to the allocated block.
Kaylis [27]

Answer:

The Pointer P becomes a dangling pointer.

Explanation:

int calculate(){

int *p = (int*)malloc(10);

*p = 10;

return p;

}

In this program, the scope of p is only with the calculate function block. Hence, once the compiler comes out of the function, it can no more access the pointer p or the memory location p is pointing to. To overcome the dangling pointer, we need to declare p as static, so that the scope of p is throughout the program.

6 0
4 years ago
Other questions:
  • Emma has used copyright works of a number of artists in her photo album and cited all of them except one. She may be caught for
    6·2 answers
  • g c 24-hour time (also known in the U.S. as military time) is widely used around the world. Time is expressed as hours since mid
    7·1 answer
  • Which of the following is similar to defense in depth and supports multiple layers of security?a. Defense in depthb. Diversity o
    7·1 answer
  • Which is a correct way to test whether two variables representing numbers, numOne and numTwo, are equal?
    8·1 answer
  • Which statements are true about modern
    9·1 answer
  • What is the target audience of an ad?
    11·1 answer
  • You can invoke or call a method from another program or method. When methods must share data, you can pass the data into and ret
    6·1 answer
  • (a) [5 pts] Suppose you purchase a wireless router and connect it to your cable modem. Also suppose that your ISP dynamically as
    13·1 answer
  • Compute the average of a list of user-entered integers representing rolls of two dice. The list ends when 0 is entered. Integers
    12·1 answer
  • What rpm command can be used to list the full paths for files within the bash package?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!