1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
12

Choose ALL guidelines listed below pertaining to fair use.

Computers and Technology
2 answers:
hichkok12 [17]3 years ago
8 0
  1. With fair use there is no need to give credit to the person who created it.

#2.

  1. Creative commons
  2. Public domain
  3. traditional copyright

#5

False(You have to apply)

#6

True

tino4ka555 [31]3 years ago
6 0

Answer:

Introduction

As you write blog posts, you may find that you want to include images you find online. Or maybe you found a great piece of writing—a recipe, a story, or a review—that you want to highlight on your own blog. It's important to know that almost all of the content you find on the Web belongs to someone. Just because you can take images, text, and more from other sites doesn't mean it's right to do so—ethically or legally.

In this lesson, you'll learn about the copyright protections that apply to work posted online. You'll learn about the rules that determine which images and text you can use, and how you can use them. You'll also learn how to protect the content you create.

The laws discussed in this lesson are United States laws. No lawyer was involved in preparing this lesson. We are not legal experts, and this lesson should not be taken as legal advice.

Understanding copyright

Copyright is the legal concept that works—art, writing, images, music, and more—belong to the people who create them. According to copyright law, any original content you create and record in a lasting form is your own intellectual property. This means other people can't legally copy your work and pretend it's their own. They can't make money from the things you create either.

To use, copy, or change a copyrighted work, you need permission from the person who holds the copyright. This permission is called a license. Even though everyone has the right to require that others respect their copyright and ask permission to use their work, some people and organizations choose to license their content more freely. They do this by giving their work a Creative Commons license or by placing their work in the Public Domain.

You might be interested in
Which of the following statements is true?a. Old paper documents, which were previously only available offline, are increasingly
alekssr [168]

Answer:

i believe its d

Explanation:

i took it before and i got 100

3 0
4 years ago
In a formatted text file, ________ signal(s) the beginning and end of a formatting command.
galina1969 [7]
The answer to this question is  <span>Delimiter
</span><span>Delimiter refers to a sequence of characters that separated several regions of texts or other streams of data.
Knowledge in using delimiter is really useful in certain programming language because it make your overall coding become a lot more efficient</span>
3 0
3 years ago
Preventive Maintenance will will reduce potential hardware and Software Problems. Select two factors based on which Preventive m
zimovet [89]

Answer:

Computer location or environment

Computer Use

Explanation:

Preventive maintenance are maintenance done, on a routine or regular basis, to prevent the occurrence of downtime which are not planned due to the failure of equipment in the system, and to ensure continual functionality of the system

In a computer system, therefore, preventive maintenance should focus on conditions that are on the maximum limits of the specification of the system

Therefore, the preventive maintenance of the system of the computer system is based on;

1) The computer location, such as the presence of dust in the environment, that can clog the circuit board of the system, or exposure to liquid that require ensuring protective covering of parts, or the high temperatures, that may require extra cooling through the use of fans

2) The computer usage; Including how the computer is used, either continuously, or once in a while, the traffic the computer is experiencing, the presence of temporary files, and malicious programs, that require removal.

5 0
3 years ago
If you give someone ______ to your device, they can control it through another phone or computer.
icang [17]

If you give someone <u>Remote access </u>to your device, they can control it through another phone or computer.

<h3>What is  Remote entry?</h3>

An authorized user can use remote access to connect to a computer or network from a different location using a network connection. Users can connect to the systems they require through remote access even if they are physically far away.

Therefore, the dangers to remote access are:

  • There is a risk of device loss or theft due to a lack of physical security safeguards.
  • as the data is transmitted through a public internet, eavesdropping.
  • unapproved access to systems or data, possibly while oblivious to the screen.
  • If someone gets access to the gadget, they could watch and change the data.

Learn more about Remote access from

brainly.com/question/28900477
#SPJ1

5 0
2 years ago
For all of you who listen to podcasts, when do you usually find time to do so?​
ss7ja [257]
Morning and afternoon commute times are obvious blocks of time that you can assume are used for listening to podcasts, but the answer will obviously vary widely based on individual habits and schedules.

Hope this helps
7 0
3 years ago
Other questions:
  • A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, the technicia
    9·1 answer
  • What device copies system files
    14·1 answer
  • An operating system is an example of _______. The hard drive, keyboard and monitor are example of_______.​
    11·1 answer
  • When driving a truck is fuel crucial
    9·1 answer
  • With only a floor plan to reference, the designer would know what about a window?
    7·1 answer
  • 1. Empty tags do not have ___________.
    14·1 answer
  • What is the benefit of making an archive folder visible in the Outlook folder list?
    6·1 answer
  • Given three floating-point numbers x, y, and z, output x to the power of z, x to the power of (y to the power of z), the absolut
    12·1 answer
  • It is acceptable to create two TCP connections on the same server/port doublet from the same client/port doublet. True False
    9·1 answer
  • Please please help ASAP it’s timed
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!