1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
3 years ago
10

What legal protection would cover a person invention?

Computers and Technology
2 answers:
Sonbull [250]3 years ago
6 0

Answer:

Option 4, A patent

According to Wikipedia, a patent is defined as, "A title that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of years in exchange for publishing an enabling public disclosure of the invention."

DerKrebs [107]3 years ago
6 0
D. A patent.
Have an amazing day!
You might be interested in
When sharing a file or folder with someone not in your __________ , you need to input the __________ of the recipient.
Ede4ka [16]
Group, name is the answer
6 0
3 years ago
Read 2 more answers
Is there similarities between plagiarism and software piracy? explain.​
xz_007 [3.2K]
<h3><u>Plagiarism</u></h3>
  • Plagiarism means using someone else's ideas or words without crediting source.
<h3><u>Pirac</u><u>y</u></h3>
  • Piracy is unauthorized use, reproduction, or sharing of copyrighted material.
3 0
2 years ago
If a device is determined to have an out-of-date virus signature file, then Network Access Control (NAC) can redirect that devic
GalinKa [24]

Answer:

C. Address Resolution Protocol (ARP) poisoning.

Explanation:

An antivirus signature file is a program written to describe and remedy a group of identified malware attacks, to prevent future attacks from the described malicious softwares. It is constantly updated to identify more malicious softwares.

A network access protocol (NAC) is used to implement access control on a network, collaborating with other protocols like ARP and unifying antiviruses, intrusion detection and vulnerability assessment.

When the virus signature file is out of date, the NAC allows a new malware, the antivirus can not identify, to access the network through ARP poisoning.

4 0
2 years ago
If you want to encrypt all authorization information as it passes through your network, what could you use?
amid [387]

Answer:

You should use the TACACS+, also known by the term "Terminal Access Controller Access Control System Plus".

Explanation:

This protocol provides users with comprehensive accounting information and an adaptable administrative control over processes like accounting, authorization, and authentication. Clients using the TACACS+ can ask for a comprehensive access control and TACACS+ would do the rest by responding to every of that request's components.

4 0
2 years ago
In a data dictionary, ____ is the maximum number of characters for an alphabetic or character data element or the maximum number
const2013 [10]

Answer:

length

Explanation:

<h2><u>Fill in the blanks </u></h2>

In a data dictionary, <u>length</u>  is the maximum number of characters for an alphabetic or character data element or the maximum number of digits and number of decimal positions for a numeric data element.

4 0
3 years ago
Other questions:
  • Write two statements to read in values for birthMonth followed by birthYear, separated by a space. Write a statement to print th
    12·1 answer
  • Jason works as an accountant in a department store. He needs to keep a daily record of all the invoices issued by the store. Whi
    13·2 answers
  • Describe the series of connections that would be made, equipment and protocol changes, if you connected your laptop to a wireles
    10·1 answer
  • Design and implement an algorithm that gets as input a list of k integer values N1, N2,..., Nk as well as a special value SUM. Y
    12·1 answer
  • Why are ethics important in PR?
    8·1 answer
  • "what command can be used on most linux distributions to find the directories where the man pages are kept"
    11·1 answer
  • Write a program to accept 10 different whole number from the user and store them in a
    11·1 answer
  • The technique helps you explore possible risks by providing access to risk areas identified in the past. It also provides the so
    10·1 answer
  • Disuss the roles of hardware,software and databases in regard to computer based information systems
    7·1 answer
  • What are the advantage of an e-library​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!