1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DiKsa [7]
2 years ago
5

Both tangible and intangible property? are not covered by intellectual property protections. are both covered by intellectual pr

operty protections. are not considered to be property and cannot be owned. can be stolen or pirated without any consequences.
Computers and Technology
1 answer:
LiRa [457]2 years ago
3 0

Answer:

B -both covered by intellectual property protections.

Explanation:

You might be interested in
Please Help! <br> I need good Anime to watch!
nirvana33 [79]

Answer:

attack on titan

kakegurui

kuroko's basketball

haikyuu

One piece

Mha

fruits basket

naruto

the great pretender

tokyo ghoul

Darling in the Franxx

Toradora

death note

Explanation:

5 0
3 years ago
.A menu within a menu is called what? (nested menu ,submenu ,recursive menu ,formal list )
Ganezh [65]

Answer: Submenu

Explanation: Submenu is the menu that is accessible through the other menu. If the user opens a menu an selects a option , if that option has further menu containing other options is an example of submenu.

Other given option are incorrect because formal list the list containing objects, nested menu is type of building and dropping the menu items and recursive menu work in the recursive manner.Thus, the correct option is submenu.

6 0
3 years ago
With which type of social engineering attack are users asked to respond to an email or are directed to a website where they are
kirza4 [7]

Answer:

Phishing

Explanation:

Phishing is a social engineering attack where users are asked to respond to an email or are directed to a website where they are requested to login with their personal credentials, such as passwords or credit card numbers.

How Phishing Works?

The attacker first carefully designs a web page identical to a real bank with fine details. Then attacker persuades the victim to go to this fake web page with login screen. The attacker gets all the information typed and enter into that fake web page. The victim often thinks that this is exactly my bank's web page so nothing is going to happen if I put log in credentials.

How to avoid Phishing?

This kind of attack can always be spotted with one simple trick. Check the address of the web page carefully. The attacker can design the web page according to his wish but he cannot have control over the web address of a real bank or real a website.  

Some general safety tips are:

  • Don't open links from spam emails.
  • Don't download malicious software.
  • Don't share personal information with strangers
7 0
3 years ago
What is Patch tool ???<br><br>​
AfilCa [17]

Answer:

<u><em>DEAR HERE IS YOUR ANSWER:</em></u>

<u><em>T</em></u>he Patch Tool is part of the healing brush set of tools. These are the go-to tools for retouching and repairing your images. The Patch Tool is primarily used to repair larger areas of an image, or get rid of any distractions or blemishes.

  • The patch tool was introduced into Photoshop at the same time as the Healing Brush
  • You don’t have to use the Patch tool to define a selection. You can use any selection tool and then select the Patch tool.  <em><u> </u></em>

<em><u>HOW TO USE PATCH TOOL IN PHOTOSHOP:</u></em>

  1. Click and hold the Healing Brush tool to select the Patch tool; on the Options bar, select the Destination radio button
  2. With the Patch tool still selected, drag to create a marquee around the source you want to use as the patch
  3. After you create the marquee, drag the selected source area to the destination to be repaired.

<em><u>I HOPE IT WILL WORK DEAR THANKS FOR ASKING  QUESTION</u></em>

Explanation:

4 0
2 years ago
Read 2 more answers
Differences between analog computer and hybrid computer​
aleksandrvk [35]

Answer:

Analog computers only work with continuous numerical data in analog quantities, digital computers can process both non-numerical and numerical data and a hybrid computer is a combination of both analog and digital. A hybrid computer has the accuracy of a digital computer paired with speed of an analog one.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Heatsinks used to protect cpus in computers from overheating, are shaped so that their surface area is very large. why is that?
    5·1 answer
  • Can y’all help me with these questions ?
    5·1 answer
  • Managing your calendar and emails can be easily accomplished through ___ software
    8·1 answer
  • Jamal is creating a presentation for a report on engineers. He wants to use a template. How can he access different options for
    14·1 answer
  • A network technician is attempting to add an older workstation to a Cisco switched LAN. The technician has manually configured t
    11·1 answer
  • The most important task in developing a new computer system/app is to: a) choose the most current technologies such as operating
    5·1 answer
  • D State Six Impact of ICT the society​
    7·1 answer
  • Kenny FRIEND ME. Ps that is my brother
    9·2 answers
  • Define a function in Scheme (or relation in Prolog) that checks whether a set of elements (represented as a list) is a subset of
    10·1 answer
  • Complete the steps for adding a recurring event.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!