1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
9

What are your thoughts on copyright? (Write 2 or more sentences)

Computers and Technology
2 answers:
ikadub [295]3 years ago
7 0
I personally believe that copyright is a way of credit theft (because it is). Taking someone else’s work and presenting it as your owns.

How y’all doin?
victus00 [196]3 years ago
5 0

Answer:

I look down on copyright. To take someone else's work and disguising it as your own seems like a form of theft.

You might be interested in
Rapunzel s-a născut într-un ţinut îndepărtat într-un regat necunoscut. Mama vitregă a închis-o pe Rapunzel într-un turn foarte î
andrey2020 [161]
Iche hebie zaft no guts dude
5 0
3 years ago
The computers in the administrative offices of the four schools throughout the district are networked to enable employees to acc
muminat
These computers in administrative offices or schools throughout the district that are networked to each other has the type of network most likely used by the workers is LAN network. Usually LAN networks are used in small offices or rooms.
3 0
3 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
After the security breach at CardSystems Solutions, a security assessment of the security measures used at the company proved th
Verizon [17]

Answer:

Was not PCI DSS- compliant.

Explanation:

This is a payment Card industry data security standard which is an information security standard that deal with branded credit card.

8 0
3 years ago
Source documents are
Bas_tet [7]

Answer:

This is the location where a document or a portion of another document was retrieved. reference: computerhope.com

3 0
3 years ago
Other questions:
  • Behaving in an acceptable manner within a workplace environment is referred to as having
    9·1 answer
  • What are the two types of digital water marking?
    5·1 answer
  • If some1 emails u and u want to know who it was how do u find that out
    10·2 answers
  • Text that has equal left and right margins is said to be
    14·2 answers
  • What is the best application to create a slide show presentation?
    13·2 answers
  • Polymorphism means ______________.
    15·2 answers
  • Read each statement below. If the statement describes a peer-to-peer network, put a P next to it. If the statement describes a s
    12·1 answer
  • Write the use of these computers.
    14·1 answer
  • Write a complete program that declares an integer variable
    7·1 answer
  • What is a reason for users and businesses to adopt 5G networks?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!