1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
3 years ago
9

The intellectual property right that gives a creator control of his or her written work is known as what?

Computers and Technology
1 answer:
Marina86 [1]3 years ago
3 0

The intellectual property right that gives a creator control of his or her written work is known as copyright. The answer is letter B. It is important  for the author to care about copyright because he is able to; to reproduce or distribute copies, to prepare derivative works or creations based on the original work and to perform or display the work creatively.

You might be interested in
The Marketing Department for CSM Tech Publishing is busy producing videos and print materials (stored in PDF format) for distrib
RSB [31]

Answer:

Check the explanation

Explanation:

In choosing the member and updating the replicate files the component or members in the replication group and preliminary members of the group as being taken as authoritative during the original replication.

For any changes you will be useing the sync -dfs replications and suspend-Dfs replication group.

7 0
3 years ago
The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
lawyer [7]

Answer:

IDP sensors can be complicated.An open-source software program called snort program.

Explanation:

Snort is an open-source network intrusion detection system (IDS) and prevention system. It is created in 1998 by Martin. Snort's open source network-based can perform analysis and packet logging on an Internet Protocol network.

The snort program can be used to detect probes or attacks. Snort configured three modes

sniffer

pocket logger

network intrusion detection.

6 0
3 years ago
Read 2 more answers
If you are using a sprite for your MakeCode Arcade game, which code block
xeze [42]

Answer:

set mySprite block

Explanation:

BRAINLIEST?

8 0
2 years ago
Read 2 more answers
Name the different types of constructors that a designer can provide in a class. Provide an example with a class showing many co
Marrrta [24]
By default, if you do not implement a constructor, the compiler will use an empty constructor (no parameters and no code). The following code will create an instance of the MyObject class using the default constructor. The object will have the default vauesfor all the attributes since no parameters were given.

MyObject obj = new MyObject();

Another type of constructor is one with no parameters (no-arg constructor). It is similar to the default, except you actually create this constructor. The contents of the the constructor may include anything. To call a no-arg constructor, use the same line of code as above. The constructor can look like the one below:

public MyObject() {
System.out.println("This is a no-arg constructor");
}

Lastly there is the parameterized constructor. This type of constructor takes in parameters as inputs to assign to values in the newly created object. You call a parameterized constructor as follows:

MyObject obj = new MyObject("Bob", 20);

The constructor will look like this:

public MyObject(String name, int age) {
this.name = name;
this.age = age;
}

In the constructor, the keyword "this" refers to the object, so this.name is a private global variable that is being set equal to the inputted value for name, in this case "Bob".

Hope this helps!
8 0
3 years ago
Hello guys. .... ............ .is a camputer that stores data and programs that people on a network can access? What is the answ
Vikentia [17]
I do t know the answer to this but i think tou can firger it iut food luck so good luck on it also I think it can be done it is Poe Poe is your answer
4 0
3 years ago
Other questions:
  • Given a int variable named yesCount and another int variable named noCount and a char variable named response, write the necessa
    9·1 answer
  • Use the RSA cipher with public key n = 713 = 23 · 31 and e = 43. Encode the word "KING" into its numeric equivalent and encrypt
    15·1 answer
  • Which group on the Home Tab allows you to add shapes to a PowerPoint slide?
    9·2 answers
  • What is a unique text-based Internet address corresponding to a computer's unique numeric IP address called
    14·1 answer
  • Define a class called Counter. An object of this class is used to count things so it records a count that is a non-negative whol
    12·1 answer
  • What is GIGO ?<br>plz answer me​
    7·1 answer
  • Write is an I.P.O cycle? Describe with figure​
    5·1 answer
  • How many passes will it take to find the five in this list?
    14·2 answers
  • Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, in
    5·1 answer
  • What happens if an email server cannot find a matching username or the mailbox is full
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!