1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mina [271]
2 years ago
10

A programmer hacks software code to understand how it works. Then she writes a program that replicates the implementation of a s

olution that has already been granted intellectual property protection. This is an example of a:
Computers and Technology
1 answer:
Setler [38]2 years ago
4 0

Answer:

Patent violation.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of trademarks, copyright and patents.

In this scenario, a programmer hacks software code to understand how it works. Then she writes a program that replicates the implementation of a solution that has already been granted intellectual property protection.

Hence, this is an example of a patent violation because she was not given the permission or rights by the intellectual property owner to modify the software.

You might be interested in
Write a method called classAttendence() that creates a 10-by-10 two-dimensional array and asks for user input to populate it wit
gladu [14]

Answer:

The method written in Java is as follows:

public static void classAttendance(){

   Scanner input = new Scanner(System.in);

   String[][] names = new String[10][10];

   for(int i =0;i<10;i++){

    for(int j =0;j<10;j++){

       System.out.print("Student Name: "+(i+1)+" , "+(j+1)+": ");

       names[i][j] = input.nextLine();        

    }  

   }

}

Explanation:

This defines the classAttendance() method

public static void classAttendance(){

   Scanner input = new Scanner(System.in);

This declares the 2D array of 10 by 10 dimension as string

   String[][] names = new String[10][10];

This iterates through the rows of the array

   for(int i =0;i<10;i++){

This iterates through the columns of the array

    for(int j =0;j<10;j++){

This prompts user for student name

       System.out.print("Student Name: "+(i+1)+" , "+(j+1)+": ");

This gets the student name from the user

       names[i][j] = input.nextLine();        

    }  

   }

The method ends here

}

<em>See attachment for complete program that include main method</em>

Download txt
6 0
2 years ago
MegaCorp MegaCorp is large manufacturing firm that operates 5 factories in Dallas, 4 factories in Los Angeles, and 5 factories i
Ivenika [448]

Answer:

Recommended is frame relay architecture with a local loop at each factory supporting the frame relay service connection to the network provider's POP

Explanation:

Frame Relay can be seen as WAN protocol that is said to often operate at both the physical and data layers link of the OSI reference model due to it high-performance and due to the fact that FRAME RELAY are as well use across Integrated Services Digital Network (ISDN) interfaces in which they are designed for cost-efficient data transmission in order to enable effective intermittent traffic between local area networks (LANs) and endpoints in wide area networks (WANs) which is why frame contains all the information necessary to route it to the correct destination.

Therefore type of BN and WAN architecture and WAN service i would recommend based on the above information is FRAME RELAY ARCHITECTURE with a local loop at each factory supporting the frame relay service connection to the network provider's POP.

8 0
3 years ago
Call of duty vanguard, war zone , fornite, gta what’s your favorite
tia_tia [17]
Warzone easily but gta a close second
8 0
2 years ago
Read the description of Mike’s work, and identify his profession. Mike’s job is to record sounds in a studio. He studies a video
kipiarov [429]
Mike is a Sound Engineer
7 0
2 years ago
Read 2 more answers
Which of the following is an Internet job search “do”?
grandymaker [24]
I believe that the option among these that is an Internet job search "do" is to pay attention to all directions before responding to job postings. You should be aware that you are never safe on the Internet, so be very careful. 
3 0
2 years ago
Read 2 more answers
Other questions:
  • Which Internet resource can you use to publicly describe an adventure trip you recently made?
    9·1 answer
  • You put $500 in an interest bearing bank account that pays 2% per year but has a fee of $2 per month. Are you getting ahead?
    14·2 answers
  • On Brainly, how can I change my username? from halfsidepancake​
    6·2 answers
  • Malcolm is part of a team developing a new smartphone app to track traffic patterns. Because team members are located throughout
    12·1 answer
  • Options to open,save,and print a document are found on which of the following tabs? A.File B.Home C. Design D. Layout
    5·2 answers
  • Type the correct answer in the box.
    5·1 answer
  • Given two int variables , firstplacewinner and secondplacewinner, write some code that swaps their values . declare any addition
    11·1 answer
  • Four actions that can be implemented on a database to autocorrect violations of referential integrity, and the outcomes of the a
    15·1 answer
  • When using correct ergonomic technique be sure to _____.
    11·2 answers
  • A form of segmentation that is based on user usage rate, user status, purchase occasion, and benefits sought is _________.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!