1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
exis [7]
3 years ago
12

Match the IP Protections Patent, Copyright and Trademark into the following cases:

Computers and Technology
1 answer:
Vesna [10]3 years ago
8 0

Answer:

A) copyright

B) copyright

C)Trade mark

D) copyright

E)Patent

Explanation:

Patent can be regarded as a form of intellectual property which helps the owner of an invention to others to sell or use the invention for some period of time. Example of this is a patent that protect microwave oven.

trademark is form of intellectual property, this could be inform of symbols, words that differentiate the product of a party from another. Example of this is a bite of apple that represents apple products.

Copyright can be regarded as a legal right given to those that owns a intellectual property which gives him/her right to copy and exclude others from reaping from where they did not sow. The owner get exclusive right to reproduce the copy.

Below is the match of the intellectual property with the examples.

a. books, poems<> Copyright

b. music, movies, paintings<> Copyright

c. company logo<> Trademark

d. software<>Copyright

e. combinations of materials to make drugs<> patent

You might be interested in
Write a function named "isValidPassword" that takes in a string and returns 1 if it stores a valid password and 0 otherwise, A v
Maslowich

Answer:

Here is code in java.

import java.util.*;

import java.lang.*;

import java.io.*;

class Solution

{

public static void main (String[] args) throws java.lang.Exception

{

   try{

   //declare and initialize string variables

       String str1="password";

       String str2="Pass_word";

    //calling function to check valid password

       System.out.println("output of password is: "+isValidPassword(str1));

        System.out.println("output of Pass_word is: "+isValidPassword(str2));

   }catch(Exception ex){

       return;}

}

// functionn to check the valid password

public  static int isValidPassword(String str)

{

// variables to count the lower,upper and non character

  int i, lower_c = 0, upper_c = 0, non_c = 0;

  char ch;

  for(i=0;i<str.length();i++)

  {

      ch = str.charAt(i);

     if(ch >= 'a' && ch <= 'z')

     {//count of lower character

        lower_c++;

     }

     else if(ch >= 'A' && ch <= 'Z')

     {

   //count of upper character

        upper_c++;

     }

     else

     {

   //count of non character

        non_c++;

     }

  }

  if(lower_c > 0 && upper_c > 0 && non_c > 0) {

     return 1;

  } else {

     return 0;

  }

}

}

Explanation:

Declare and initialize two string variables.In the isValidPassword() function, pass the string parameter and then count the lower, upper and non character in the string.If string contains call the three characters then function will return 1 otherwise it will return 0 .

Output:

output of password is: 0

output of Pass_word is: 1

8 0
3 years ago
What are options in the Advanced tab in the Share Workbook dialog box? Check all that apply
madam [21]
Where are the options

7 0
3 years ago
Read 2 more answers
Methods for preventing/overcoming group conflict include all EXCEPT:
kondor19780726 [428]

Answer:

recognizing that gender differences are a myth.

Explanation:

The options are:

  • active listening.
  • recognizing that gender differences are a myth.
  • structured debate.
  • building cross-cultural understanding

Without active listening, structured debate, and cross-cultural understanding group conflict are definitely on the card. However, no one now is concerned about gender differences. As now both the genders are already having the equal status in at least developed countries. However, this too can play a role in avoiding group conflict. However, since this is not that important considering the current context, this looks like being the correct option here. Hence, the above mentioned in the answer section is the correct option.

7 0
3 years ago
Higher resolution images mean they can be enlarged better, <br> True or false
ella [17]

Answer:

False

Explanation:

High resolution just mean It looks better

6 0
3 years ago
Read 2 more answers
Worksheet ranges can be turned For easy analysis
Firdavs [7]

Answer:

Worksheet ranges is a group of cells, and a value range like 25 to 340. It is used for data modeling. Like you can use it in the vlookup, Hlookup and Xlookup for looking up a column cell value in the mentioned worksheet range. Different worksheet's ranges of cells can also be used, and in any number from throughout the workbook, and that makes the analysis quite easy. Through work sheet ranges we get the control over all the cells as well as cells group. Whatever analysis we do, we do on the list of cells. And through the worksheet ranges we get the control over the cells. And thus, this is extremely useful definitely.

Explanation:

Like one worksheet range can be from top left corner to the bottom right corner. And this assigns whole worksheet as the worksheet range.

Its used in almost all the Excel formulas, and you must know it.

An example is:

Worksheets("Sheet2").Range(Cells(2, "B"), Cells(35, "B")).select

This selects the Range B2:B35 from Sheet 2.  

6 0
4 years ago
Other questions:
  • What operator is used to create a validation rule? A. – B. / C. &lt; or &gt; D. +
    12·1 answer
  • An example of an email client is:<br> A.)Yahoo<br> B.)Gmail<br> C.)Outlook<br> D.)All of the Above
    9·1 answer
  • A _____ is an employment test that evaluates your specific job-related abilities, such as typing speed. It is recommended that y
    6·2 answers
  • How do you do this question
    11·1 answer
  • Charles would like to visit a specific page on the World Wide Web. How should he do it? Enter the address in a search engine cli
    15·2 answers
  • Name similarities between innovation and invention
    6·1 answer
  • Describe any five GSM PLMN basic services?
    10·1 answer
  • In this scenario, hackers launch cyber-attacks that affect several parts of the nationâs financial infrastructure over the cours
    8·1 answer
  • Hi I need help with an assignment. We're learning about encryption and decryption in code.org. i need help with three of the tex
    14·1 answer
  • Why does the peot use a simular pharase at the beggining of each stanza
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!