1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
3 years ago
14

Which of the given original work is protected by the copyright law

Computers and Technology
2 answers:
user100 [1]3 years ago
8 0

Answer:

The fault in our stars by John Green

Explanation:

" the fault in our stars" by John Green is a solo novel written by John green hence it is the original work of John Green. an copyright laws protect works with originality and unique in nature from other works.

The logo of NBC and the BMW logo are made up of typefaces, shapes, words and slogans which are in already in the open domain. logos alone are not qualified to have copyright law because they are made of other works like slogans and shapes used in creating it . Monsanto's genetically modified seeds are not Original works but Modified works made from the original work.

andreyandreev [35.5K]3 years ago
7 0
BMW is my desion u cant copy write alot of things like books movies logos
You might be interested in
Define a public static method named s2f that takes two String arguments, the name of a file and some text. The method creates th
frez [133]

Answer:

Java solution (because only major programming language that has public static methods)

(import java.io.* before hand)

public static boolean s2f(String fileName, String text){

   try{

       PrintWriter out = new PrintWriter(new File(fileName));

       out.println(text);

       out.close();

       return true;

   }

   catch(Exception e){

       return false;

   }

}

6 0
3 years ago
A system of classifying and organizing online content into categories by the use of user-generated metadata such as keywords is
SCORPION-xisa [38]

Answer:

Folksonomy.

Explanation:

A system of classifying and organizing online content into categories by the use of user-generated metadata such as keywords is called a folksonomy.

This ultimately implies that, folksonomy is a user-generated system which is typically used for classifying and organizing online content into various categories through the use of metadata such as keywords, electronic tags and public tags in order to make it easier to find in the future.

Hence, folksonomy is highly beneficial in areas such as collaborative learning, teacher resource repository, collaborative research, educational platforms, e-commerce etc.

6 0
2 years ago
Define storage device with two examples? ​
Vlad [161]

Answer:

Hehe!

Explanation:

Storage Device is a technology consisting of computer components and recording media that are used to retain digital data. It is a core function and fundamental component of computers. The central processing unit of a computer is what manipulates data by performing computations.

Examples: Hard disk and Floopy Disk.

7 0
2 years ago
Read 2 more answers
How do i convert videos on the computer
mr Goodwill [35]

Answer:

An online tool or software.

Explanation:

Video conversion can be done using an online tool and software. If you choose to convert your videos by using an online tool, open any online tool and paste the link of the video or upload a video file from your computer, select the format you want and then click convert. Conversion takes a few seconds, and once the conversion is done, you can download the audio file. And if you choose to convert your videos by using the software, you have to download software, install it in your personal computer, and use it for conversion. In this process of transformation, you have to upload a video file from your computer. And if you do not need the output file format, some software can choose the setup automatically.

5 0
3 years ago
The concept of a process in an operating system embodies two primary characteristics, one of which is:
miv72 [106K]

Answer:

Resource Ownership and Scheduling execution

Explanation:

In process characteristic the characteristic is

  • Resource ownership
  • Scheduling / Execution

In Resource ownership, the OS performs a protection function where unwanted interference in processes are with resources

In scheduling execution, the process has execution state and scheduled. They can be separated by resource ownership.

The dispatching of the process is the lightweight process, and it is multi-threading. The ability of the operating system supports the single concurrent process.

The process is a unit in the resource protection and protected the CPU and other processes. It contains the multiple thread execution

Each thread contains the running, ready state and saved the thread context and access the memory. Some necessary activities of the various threads are the same address space and the resources.

7 0
3 years ago
Other questions:
  • How would I view the ruler on my document if it was not visible
    9·1 answer
  • 4-One possible performance multiplication enhancement is to do a shift and add instead of an actual multiplication. Since 9 * 6,
    12·1 answer
  • How many Iron molecules are in the compound Fe4O2?
    15·2 answers
  • ........ is a formal description of message formats and the rules for exchanging those messages
    12·1 answer
  • A technician has been asked to upgrade a processor and needs to do some research. The computer is just a couple of years old. Wh
    13·1 answer
  • In a non-price rationing system, consumers receive goods and services first-come, first served. Give me an example of a time whe
    8·1 answer
  • What are source data entry devices​
    13·1 answer
  • In which wireless configuration type do nodes communicate directly with each other, rather than with an access point?
    5·1 answer
  • The purpose of an Internet _____ is to receive packets and send them along towards their final destination.
    8·1 answer
  • Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authe
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!