1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helen [10]
3 years ago
13

What are possible penalties if a designer is caught breaking copyright laws?

Computers and Technology
1 answer:
Dominik [7]3 years ago
3 0

Answer:

1 and 4 are the correct answers.

Explanation:

You might be interested in
HOW DO I HACK PUBG MOBILE WITH PROOF <br>GIVE ME LINK​
muminat

Answer:

why do u want to do that i have an acc i dont even use that is so good with so much uc and other skins on it

Explanation:

5 0
3 years ago
Read 2 more answers
18. What do we call the Microsoft Word File?
Colt1911 [192]

Answer:

<h2>we call Microsoft Word File "<u>document</u>" or "<u>docx</u>"</h2>
5 0
2 years ago
What stage of software development incorporates planning to help make changes in the project plan based of reviews
larisa86 [58]

Answer:

A

Explanation:

8 0
3 years ago
What is required for real-time surveillance of a suspects computer activity?/p Group of answer choices a. Blocking data transmis
Hitman42 [59]

Answer:

c  Preventing data transmissions between a suspect’s computer and a network server

Explanation:

3 0
3 years ago
A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department
Mashcka [7]

Answer:

d. The technician should be setting NTFS permissions instead of using Group Policy.

Explanation:

NTFS (New Technology File System) permissions run on drives formatted with NTFS.Under NTFS permissions, individual users are granted permission at the Windows logon and so in this way local users and network users are affected, affecting each user from wherever he may be connecting from. In the example above using NTFS permissions would solve the problem of file system among departments .

4 0
3 years ago
Other questions:
  • When programming, the word "execute" means which of these?
    13·1 answer
  • What is the command to use the memory diagnostics tool?
    11·1 answer
  • State the seven common measures of queuing system performance ? State the assumptions of the “basic” single-server queuing model
    10·1 answer
  • What method of heat transfer is used when the sun heats the earth?
    14·1 answer
  • The purpose of this category of interview questions is to learn about the interviews personal attributes
    6·1 answer
  • ____ can be used to break continuous text to one or more sentences​
    7·1 answer
  • The success of Eye of the storm exemplifies
    9·1 answer
  • Choose all items that represent features of the job application process.
    5·2 answers
  • What is number system in computer language ​
    13·1 answer
  • E. Write an algorithm to show 'How to prepare a cucumber sandwich?". ​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!