1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
3 years ago
5

Thomas has signed a deal with a production house that allows them to use his images on their website. What is required when imag

eers permit
usage of their images for commercial or editorial purposes?
A. copyright
B licensing
c. permit
D. fair use
Computers and Technology
2 answers:
BaLLatris [955]3 years ago
6 0

Answer:

copyright ( A )

Explanation:

copyright law is required to be followed when granting permit to a second party who is not a co-owner of a property the usage of the property be it intellectual or an invention created by the original owner.

Thomas is the owner of the image to be used by the company so before Thomas will go into signing a deal with the company who wants to use its invention which in this case is his images, the copyright law that protects the ownership of such Image will have to be viewed by the company to ensure that the image truly belongs to Thomas so that no copyright laws will be contravened.

Phoenix [80]3 years ago
4 0
D. Fair use. Because you need to give credit to the owner.
You might be interested in
Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
GarryVolchara [31]

Answer:

d. Data Loss Prevention (DLP)

Explanation:

Data Loss Prevention (DLP) -

It refers to the type of strategy , where any sensitive or personal information can not be leaked out in the corporate network , is referred to as data loss prevention .

There are various software products that help to save the data , by controlling the information shared by the users .

The method is important for any business .

Hence , from the given scenario of the question ,

The correct answer is d. Data Loss Prevention (DLP) .

7 0
3 years ago
What is a Network It’s a system that is used to link two or more computers and name the different types of networks.?
mariarad [96]
Yes, that's correct. a network is where you connect two+ computers together.
5 0
3 years ago
List five applications field of a computer?​
True [87]

list five applications field of a computer?

answer= <em> </em><em>home</em><em> </em><em>,</em><em> </em><em>school</em><em>,</em><em> </em><em>h</em><em>o</em><em>spital</em><em>,</em><em> </em><em>bank</em><em>,</em><em> </em><em>super</em><em> </em><em>markets</em><em>,</em><em> </em><em>etc</em><em>.</em><em>.</em><em>.</em><em>.</em>

5 0
3 years ago
____________ are the in – built functions that perform a particular pre – defined task when used in a computer program.
saveliy_v [14]

Answer:

System software.

Explanation:

System software are the in-built functions that perform a particular pre-defined task when used in a computer program. An example of a system software is an operating system.

An operating system (OS) is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes. Some examples of an operating system are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

4 0
2 years ago
Choose the response that best completes the following statement.
slava [35]

Answer:

consider the outcome

Explanation:

7 0
2 years ago
Other questions:
  • The network ____, the person overseeing network operations, uses a server operating system to add and remove users, computers, a
    15·1 answer
  • Which of the following is a sigh that your computer may have been infected with malicious code
    12·1 answer
  • Which of the following is not a common network architecture type?
    9·1 answer
  • Dora electronically transferred $591.68 from her checking account to Matt's checking account. In what column of the check regist
    14·2 answers
  • What will be displayed as a result of executing the following code?
    5·1 answer
  • What is the difference between a sequential program and an event-driven program?
    9·1 answer
  • Write a program that asks the user for a CSV of the NYC Open Data Film Permits: There is a sample file for June 2019 film permit
    9·2 answers
  • A type of VPN connection, where a single computer logs into a remote network and becomes, for all intents and purposes, a member
    13·1 answer
  • 3.3 Code Practice: Question 1
    15·1 answer
  • Which of the following is Microsoft Windows 10 virtualization technology?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!