1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonja [21]
3 years ago
13

Sharl downloads images from an online library and uses them in her work. The images are shared under the Creative Commons Attrib

ution (CC BY) license. What is she required to do to comply with the terms of the license?
A. share derivatives of the images on identical terms

B. acknowledge the sources of the images

C. use the images for noncommercial purposes

D. use the images in their original form, without modification​
Computers and Technology
1 answer:
alexandr402 [8]3 years ago
7 0

Answer :

She needs to B. acknowledge the sources of the images

Why ?

As it is stated on the creativecommons . org :

"Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.

No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits."

You might be interested in
What does the format painter button in excel do
wlad13 [49]
The format painter button in excel copies formatting from one place and it applies it to another
7 0
4 years ago
Select the correct answer.
ioda

Answer: D

Explanation:

6 0
3 years ago
Read 2 more answers
A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.
Lunna [17]

The answer to this question is a firewall. A Firewall is a network security system that blocks and prevent unauthorized use or access of company’s network. Firewall is also a program that screens and restricts viruses and other users like hackers to reach the network through the internet. 

3 0
4 years ago
8.9 code practice edhesive
nadezda [96]

Answer:

.

Explanation:

7 0
3 years ago
1
Vitek1552 [10]

Answer:

A

Explanation:

.

.stack 4096

ExitProcess PROTO, dwExitCode:DWORD

.data

Sun=0

Mon=1

Tue=2

Wed=3

Thu=4

Fri=5

Sat=6

warray BYTE Sun, Mon, Tue, Wed, Thu, Fri, Sat

INVOKE ExitProcess, 0

7 0
3 years ago
Other questions:
  • Which of the following will most likely result in a decrease in population?
    11·2 answers
  • The waterfall model and spiral model are variations of SDLC. Do some research to find out what they are and explain how these mo
    14·1 answer
  • You would like to search for information about storms but not tornadoes. What type of search strategy may be useful?
    10·2 answers
  • A customer wants to purchase a new home computer. The machine will mainly be used for internal browsing and streaming video, exc
    7·1 answer
  • A rang check that could be use to validate... Date and time
    13·1 answer
  • In this assignment, you will design and create an ArrayList-based application that manages a collection of DVDs. Information abo
    15·1 answer
  • Hat is the purpose of the domain name?
    7·2 answers
  • What do you mean by an algorithm?<br>​
    7·1 answer
  • A drink costs 3 dollars. A pizza costs 6 dollars. Given the number of each, compute total cost and assign to totalCost. Ex: 2 dr
    13·1 answer
  • What are five types of applications you can create in Visual Basic 2017?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!