1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ozzi
4 years ago
5

​ In the U.S., a work that was created in 2000 by an individual author who died in 2005 will be protected by copyright until ___

_.
a.
​2120

b.
​2075

c.
​2100

d.
​2070
Computers and Technology
2 answers:
IRISSAK [1]4 years ago
7 0

Answer:

b.  ​2075

Explanation:

The general rule for the copyright protection of works made by one author after January 1, 1978, is: the work is protected for 70 years after the death of the author.

The work was created in 2000 so it is after January 1, 1978 (there are different rules for the work made before that day). The author dies in 2005, plus the 70 years of protection after the death of the author:

2005+70=2075

Nataliya [291]4 years ago
3 0

Answer:

The correct answer is letter "B": 2075.

Explanation:

According to the Copyright Law of the United States, <em>individual authors' creation</em> is respected and kept as original from them for seventy (70) years after the inventor passes away. However, that period can be extended to <em>ninety-five (95) years after the publication</em> of the work or <em>one hundred-twenty (120) years after the creation</em> <em>if the work was done for a third party</em>.

Thus, like the individual author's work was created in 2000 but that person passed away in 2005, the deceased date is taken as reference. The Copyright Law will protect his or her work until 2075 (<em>2005+70</em>).

You might be interested in
Please Help
andrew-mc [135]

Answer:

A, C, and E

Explanation:

B and D have nothing to really do with the software. You can copy files by using software, you can delete files, and it lets you manage your shared folders. You cant really view events by using software and you cant find out more stuff about security events from it. Hope this helps. :) <3

5 0
3 years ago
Read 2 more answers
No Browsing History While using the browser on your tablet, you realize that it is not keeping a history of websites you have vi
My name is Ann [436]

Answer & Explanation:

No Browsing History:

  • Your browser is probably set to incognito mode, change it to general mode.
  • space set on your drive to save the content from your browser might be completely filled, Make sure you have given your browser enough space on your drive to save contents.
  • The number of days to record the history in your browser is set to 0, Check the settings and make sure it is not set to 0.

Phishing Scam

  • Change all the credentials on the site that you have disclosed.
  • Immediately report the mail to an IT department and necessary authorities.
  • Mark the mail as span and block the mail id.

Suspicious File Attachment

  • May be that the suspicious file contains a virus file. Often such viruses are attached to external "Show-case" files so that the victim is not able to identify them. Once the external file is tried to open, the virus slips into the main memory (your RAM) and start executing in the background, creating copies of itself and executing every copy. Soon they start eating up the main memory (The memory that runs all your programs) making your PC slow to respond.

Antivirus Software Outdated

  • Connected to the Internet and update the antivirus.

Laptop's Physical Security

  • Set a password.
  • install a tracking software.
4 0
3 years ago
The ____ is composed of tabs, each containing groups of related commands.
Mashutka [201]
Ribbon im pretty sure is your answer
3 0
4 years ago
What is you full name ?​
Svetllana [295]

Answer:

Name: Whydoyouneedtoknow

8 0
3 years ago
Read 2 more answers
What helps to identify trends?
vagabundo [1.1K]
Pie graph but idk if thats the answer
4 0
4 years ago
Read 2 more answers
Other questions:
  • Your crt monitor flickers. what should you do
    6·1 answer
  • What are tags?
    13·1 answer
  • Let’s say you are given a number, a, and you want to find its square root. One way to do that is to start with a very rough gues
    15·1 answer
  • Two of the following tasks would most likely be completed by a biomedical engineer?
    7·1 answer
  • In the following data definition, assume that List2 begins at offset 2000h. What is the offset of the third value (5)?
    10·1 answer
  • Three batch jobs, A through E, arrive at a computer center at almost the same time. They have estimated running times of 10, 6,
    6·1 answer
  • Java uses a right brace to mark the end of all compound statements. What are the arguments for and against this design?
    8·1 answer
  • Which option should you select to accept a tracked change? A. Accept B. Reject C. Review D. Delete
    8·2 answers
  • What kind of email formatting change can you make using the Rules Wizard?
    12·1 answer
  • Which window would show you bindings for local area connection 2?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!