1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delicious77 [7]
3 years ago
13

Renae wants to write a blog about her favorite sports stars. She wants the blog to be informative and visually appealing, so she

wants to include pictures of various sports stars on her blog. Which is the best strategy for Renae to avoid violating copyright?
A. write original content and use pictures from other websites
B.copy stories from sports magazines and use pictures from other websites
C.write original content and use publicly shared pictures
Computers and Technology
2 answers:
Umnica [9.8K]3 years ago
8 0
THe answer would be c (:
Usimov [2.4K]3 years ago
6 0
To avoid copyright infringement, i would say that the best choice would be C. Hope this helps!
You might be interested in
4. In paragraph 7, what is the meaning of the phrase "not
galben [10]

Answer:

you need to give context of the situation

7 0
2 years ago
In the program below, which two variables have the same scope?
bagirrra123 [75]

Answer:

rhymeWord

Explanation:

correct answer edge 2020

3 0
3 years ago
Read 2 more answers
Write a q basic program to find the sum of all the even numbers from 1 to 50​
Artist 52 [7]

Answer:

CLS

M=2

SUM=0

DO WHILE M<=50

SUM=SUM+M

M=M+2

LOOP

PRINT " The sum of all even numbers between 1 and 50 is"; sum

5 0
3 years ago
Current versions of windows support file names up to ________ characters long
Verizon [17]
Newer, or current versions of Windows from XP to 10 use the NTFS file system. The file system supports up to 255 characters in a file name. The total path length supports up to 30,000 characters.
3 0
3 years ago
Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
kakasveta [241]

Answer:

It is called a WPS brutal force attack.

Explanation:

Wired and wireless networks are both susceptible to attacks. The wired network, the advantage as a cable connection, is more secure than wireless networks, but wireless network also have security measures like the wifi protected set up (WPS).

WPS is used to connect to a network without passphrase, but with a key combination or a PIN.

Brutal force attacks are used on WPS to forcefully generate the PIN, using a third party software.

3 0
3 years ago
Other questions:
  • The highly advanced decision support feature integrated within an electronic information system would support which activity?
    9·1 answer
  • Describe two ways in which an organizer can assist in taking notes
    8·2 answers
  • Which of the following components controls the opening and closing of the valves in an engine ?
    15·2 answers
  • How to write a function that counts the letters in a string in C?
    13·1 answer
  • create a boolean variable called sucess that will be true if a number is between -10 and 10 inclusively python
    11·1 answer
  • Does anyone know a way to skip the videos on Edgnuity?
    15·1 answer
  • Match the item to the type.
    11·1 answer
  • Which element of a presentation program’s interface displays the slide you are currently creating or editing?
    14·2 answers
  • What is the Intranet?<br>​
    5·1 answer
  • How would you design an adaptive environment for people who are blind?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!