1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
3 years ago
14

Which of the given original work is protected by the copyright law

Computers and Technology
2 answers:
user100 [1]3 years ago
8 0

Answer:

The fault in our stars by John Green

Explanation:

" the fault in our stars" by John Green is a solo novel written by John green hence it is the original work of John Green. an copyright laws protect works with originality and unique in nature from other works.

The logo of NBC and the BMW logo are made up of typefaces, shapes, words and slogans which are in already in the open domain. logos alone are not qualified to have copyright law because they are made of other works like slogans and shapes used in creating it . Monsanto's genetically modified seeds are not Original works but Modified works made from the original work.

andreyandreev [35.5K]3 years ago
7 0
BMW is my desion u cant copy write alot of things like books movies logos
You might be interested in
Update thejavafile names to include your initials at the end, send .java file only.1. Completein-place heapSort, which takes an
Sladkaya [172]

Answer:

Yes

Explanation:

Because you send it to the java file and the java file is only one single (1)

3 0
3 years ago
Suggest three ways in which celebrating an occasion influences food choices?
Basile [38]

Celebrating influences food in more than 1 way
6 0
2 years ago
Read 2 more answers
What technique is used to separate the different cell parts?
Brut [27]
This should be in Science/Biology
5 0
3 years ago
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
Este tipo de software sirve para controlar e interactuar con el sistema operativo, proporcionando control sobre el hardware y da
attashe74 [19]

Answer: c

Explanation:

4 0
2 years ago
Other questions:
  • Classify the given items as belonging to the public domain or protected by copyright law.
    6·2 answers
  • You're trying to decide which disk technology to use on your new server. the server will be in heavy use around the clock every
    10·1 answer
  • To copy text in a Word document to an Excel spreadsheet, you should first format the text as a Word table or as text separated b
    11·2 answers
  • . Two blue armies are each poised on opposite hills preparing to attack a single red army in the valley. The red army can defeat
    5·1 answer
  • Given an integer n and an array a of length n, your task is to apply the following mutation to an: Array a mutates into a new ar
    5·1 answer
  • Who can search the internet and select element base on important words
    13·1 answer
  • Can someone please find the IP address of a 3630 hp printer?
    8·1 answer
  • What are some examples of what can be changed through options available on the mini toolbar
    5·1 answer
  • How does Shakespeare immediately introduce Tybalt as a menacing character?
    9·1 answer
  • . Write at least three benefits of using a network.​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!