1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
14

What is the best way to use copyrighted material?

Computers and Technology
2 answers:
Tcecarenko [31]3 years ago
8 0

Answer:

Locate the author and request permission to use the material.

Explanation:

There are different types of copyright though, they may just point you at what type of copyright it has and you need to read it to figure out what you can/can't do with the material.

olga55 [171]3 years ago
4 0

Answer:

B

Explanation:

You might be interested in
What is the binary number for the decimal 1024? ​
GaryK [48]

Answer:

10000000000

Explanation:

While a typical byte only goes up to 8 digits, you can expand past that by having each integer past the initial 8 just double the amount from before

8 0
3 years ago
Read 2 more answers
If a device does not require a driver, it is _____.
xxTIMURxx [149]

Answer:

(B) plug and play

Explanation:

If a device does not require a driver, it is <u>plug and play</u>. Plug and Play (PnP) is a combination of hardware and software support that enables a computer system to recognize and adapt to hardware configuration changes with little or no intervention by a user, including the loading of appropriate drivers.

7 0
4 years ago
Select the correct answer.
sashaice [31]

Answer:

A. Project Manager

Explanation:

3 0
4 years ago
Read 2 more answers
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
julia-pushkina [17]

Answer:

Option (A) is the correct answer.

Explanation:

A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.

In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--

  • Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
  • Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
  • Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
4 0
4 years ago
What's the difference between an exe file and an msi file?
tatiyna

Answer: <u>EXE files are mainly used to indicate that the file is executable</u>

<u>MSI files show that the file is a Windows Installer</u>

<u />

Explanation:

EXE files are mainly used to indicate that the file is executable

MSI files show that the file is a Windows Installer

<u>MSI files are only used with launchers, EXE does not need to be used with launchers </u>

Hope this helped :)

5 0
2 years ago
Other questions:
  • You are a network technician for a small corporate network. Today you moved an unused workstation to the IT Administration offic
    12·1 answer
  • References are usally innocuous because they are the least personal and direct of the four reference types
    5·1 answer
  • Technlogies are having a negative impact on business true or false
    7·1 answer
  • 7. Which innovation in video games do you think has been most significant? Include at least one way that innovation affects the
    6·1 answer
  • Can somebody please halp meeee?? I'm doing Web design.
    12·2 answers
  • Jeanne writes a song, and Raul wants to perform
    6·2 answers
  • Does anyone know to get Google updated if it failed to update?
    12·1 answer
  • Select the device that will have the most network ports
    8·1 answer
  • Which attributes does not come in tag?
    12·2 answers
  • Data is stored on ________ using a laser to either melt the disc material or change the color of embedded dye.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!