1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
9

What are your thoughts on copyright? (Write 2 or more sentences)

Computers and Technology
2 answers:
ikadub [295]3 years ago
7 0
I personally believe that copyright is a way of credit theft (because it is). Taking someone else’s work and presenting it as your owns.

How y’all doin?
victus00 [196]3 years ago
5 0

Answer:

I look down on copyright. To take someone else's work and disguising it as your own seems like a form of theft.

You might be interested in
Banks use _____, which are electronic transmissions of account exchange information over private communications’ networks.
faltersainse [42]

Answer:

Wire transfer

Explanation:

Wire Transfer also known as remittance under the U.S. law is the electronic transfer of money which is carried out across a network that is run by several banks and money transfer agencies around the globe. With Wire Transfer, people at different parts of the Word can securely send money to individuals at other financial institution in any part of the world.

The following are important points to note about wire transfers:

1. It is an electronic transfer of funds across a network of banks and money transfer agencies around the world.

2. The individual or senders pays a transaction fee at their banks and must provide the receivers details including bank name and account number.

3. Wire transfers can take up to two working days to complete

4. The Office of Foreign Assets monitors and controls international wire payments, to prevent money laudering and funding of illegal activities like terrorism

7 0
3 years ago
After correctly configuring a new wireless enabled thermostat to control the temperature of the company's meeting room, Joe, a n
ZanzabumX [31]

Answer:

The WPA2 shared key is incorrect is the correct answer.

Explanation:

The WPA2 shared key is incorrect because when the technician installs a new wireless thermostat for the purpose to control the temperature of the meeting room. Then, admin determines that the thermostat is not connecting to the control system through the internet and the admin authenticate that its parameter of receiving thermostat is associated with the AP. So, that's why the following option is correct.

8 0
3 years ago
1.which screen appears after the password is typed (welcome, lock)​
jenyasd209 [6]

Answer:

it should be the welcome screen I will hope so lol

4 0
3 years ago
Read 2 more answers
Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. T
MrMuchimi

In python 3.8:

user_input = input().split()

x = user_input[0]

char = user_input[-1]

for w in range(1,int(x)+1):

   if char in user_input[w]:

       print(user_input[w])

I hope this helps

7 0
3 years ago
Que significa el término “Informática”?
Ad libitum [116K]

Answer:

Explanation:

proviene del francés informatique, implementado por el ingeniero Philippe Dreyfus a comienzos de la década del '60. ... De esta forma, la informática se refiere al procesamiento automático de información mediante dispositivos electrónicos y sistemas computacionales.

4 0
3 years ago
Other questions:
  • What do you like to play
    13·2 answers
  • A program called the ______ combines the object program with other programs in the library and is used in the program to create
    5·1 answer
  • You are given n sorted sequences each one containing n keys. You may assume n is a power of two. We want to merge them into one
    15·1 answer
  • Your essay is due tomorrow and you don't have time to write it. You decide to buy an essay online. You've paid for it, so it can
    12·1 answer
  • Why when i click home on iphone i still at my grandma house
    11·2 answers
  • All of the following are ways to limit what is tracked about you online, except:
    12·1 answer
  • NAND is logically complete. Use only NAND gates to constructgate-level circuits that compute the
    7·1 answer
  • You're working in a table that has three columns and five rows. Since the first row will be a header row, you want it to span al
    6·1 answer
  • Select the correct word to complete the sentence.
    8·1 answer
  • The specific instructions that a computing device needs to boot up and control the hardware
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!