1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marissa [1.9K]
3 years ago
12

Jameis is researching at his local library when he finds a perfect source to use in his paper. When he goes to check the book ou

t, he learns that he has overdue library fees and therefore can't check out another book. Since he didn't have time to read the entire book and take notes, he decides to photocopy the entire book so he can take the copy home. Is this allowed? A. Yes. Fair use allows someone to make up to 20 copies of entire books. B. No. Fair use doesn't allow someone to copy and entire book or periodical. C. Yes. As long as he doesn't share the copy with anyone else, copying the book is allowed under fair use. D. No. If Jameis copies the book, he needs to leave the copy at the library.
Computers and Technology
2 answers:
aliya0001 [1]3 years ago
5 0

the answer is B. No. Fair use doesn't allow someone to copy and entire book or periodical.


if he has exaused his library rights, he is out of luck.


that would be piracy! which is HIGHLY ileagal. he could go to federal prision.

grin007 [14]3 years ago
4 0

I'm pretty sure it's A or B idk. Read this, it might help https://fairuse.stanford.edu/overview/fair-use/what-is-fair-use/

You might be interested in
Which is true about TCP and UDP? Choose two answers.
vichka [17]

Answer:

TCP is a connection-oriented protocol

UDP does not acknowledge a receipt of data

Explanation:

TCP (Transmission Control Protocol) is a protocol to transfer data, this is one of the most important protocols on the entire internet, this method was implemented from the beginning of the network.

UDP (User Datagram Protocol) this is a protocol faster than TCP because this method doesn't establish a connection to sent data, in this case, always sent data, but TCP is more secure than UDP, and for that UDP is used to transfer music or videos, and TCP websites and database.

UDP doesn't need acknowledgment is done by UDP, is only concerned with speed.

7 0
3 years ago
____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small,
LiRa [457]

Answer:

d.) Service-Oriented Architecture

Explanation:

Because its definition matches

4 0
3 years ago
Which of the following rules should be used to keep the appropriate distance between your vehicle and the vehicle in front of yo
S_A_V [24]
I would say two car length rule. I am not sure what the official license rule is or if it has been changed, but originally the rule was 3 seconds usually depending on how fast the car is going. The faster you are going, the longer it takes to stop. So two-car length rule would probably be the best choice. Definitely not A.
8 0
3 years ago
Read 2 more answers
How can you use the Address Book to address an email message? Use the drop-down menus to complete the sentences. 1. Type an emai
Delvig [45]

Answer:

1. AutoCorrect

2. Address book

Explanation:

stan bts ?

5 0
3 years ago
Read 2 more answers
. Convert your age into binary and then to hexadecimal. Show your work.
Dovator [93]

Explanation:

Age = 23.

To convert a base 10 number to hexadecimal number we have to repeatedly divide the decimal number by 16 until  it becomes zero and store the remainder in the reverse direction of obtaining them.

23/16=1 remainder = 5

1/16=0 remainder = 1

Now writing the remainders in reverse direction that is 15.

My age in hexadecimal number is (15)₁₆.

5 0
3 years ago
Other questions:
  • What was the han dynasty and the roman empire known for?
    5·1 answer
  • How to remove a channel from favorite list on suddenlink?
    15·1 answer
  • What term is used to describe a function that uses an algorithm to convert an input of letters and numbers into an encrypted out
    9·1 answer
  • What kind of energy transformation occurs in a gasoline-powered car?
    14·1 answer
  • Each professional association has
    7·1 answer
  • What should you do to organize a large amount of data??
    10·1 answer
  • What are the characteristics of good blogs?
    8·1 answer
  • Hi need help on this <br> what is cyberspace
    14·1 answer
  • 1. Briefly explain the concept of signature of a function, in a function declaration. What signature components are crucial for
    9·1 answer
  • Why should information technology NOT be taught in school?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!