1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zina [86]
2 years ago
6

Javier inherited rights to his grandfather’s writing, which was protected by copyright law that expired a few years later. What

happens to his grandfather’s work in this situation?
A.
It is only protected by fair use rules.

B.
It enters public domain.

C.
The copyright is classified differently.

D.
It is removed from sale.
Computers and Technology
1 answer:
Yanka [14]2 years ago
3 0

Answer:

C. The copyright is classified differently.

Explanation:

Since it is a writing and not a business or a car brand or a computer company like that high stuff that is very important it wouldn't effect you since you are family and since he left you rights to the copyright you can re copyright it after  it is expired with enough proof that he gave you rights.

You might be interested in
Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.
romanna [79]

Answer:

a. engranaje 1 → engranaje 2 → engranaje 3 → engranaje 4

     z1 = 10            z2 = 20              z3 =10            z4 = 20

b. n2 = 600 rpm, n3 = 1200 rpm, n4 = 600 rpm

   la relacion de transmision = 2

Explanation:

where z1 = 10, z2 = 20, z3 = 10, z4 = 20

and n1 = 1200 rpm

n2 = n1 * z1/z2 = (1200 * 10)/ 20 = 600 rpm

n3 = n2 * z2/z3 = (600 * 20)/ 10 = 1200 rpm

n4 = n3 * z3/z4 = (1200 * 10)/ 20 = 600 rpm

la relacion de transmision = z2/z1 * z3/z2 * z4/z3

= 20/10 * 10/20 * 20/10 = 2 * 0.5 * 2 = 2

7 0
3 years ago
Some of the more important __________ include anti-virus (and anti-malware), host-based firewall, system hardening (removing unw
xeze [42]

Answer:

host-based security measures

Explanation:

Anti-virus, host-based firewall, system hardening, change control, and log management are host based.

6 0
3 years ago
ANSWER IN 5 MINUTES TO GET 50 POINTS!!!
Luba_88 [7]
The answer is d. Hope that helps.
7 0
3 years ago
Use python
Degger [83]

Answer:

def rec_dig_sum( num ):

   num_list = [ digit for digit in str(num)]

   total = 0

   for x in num_list:

       total += x

   return total

def dict_of_rec_dig_sums(low, high):

   mydict = dict()

   for number in the range(low, high+1):

      mydict[rec_dig_sum(number)] = number

   return mydict

Explanation:

The python program defines two functions, "rec_dig_sum" and "dict_of_rec_dig_sums". The former accepts a number and returns the sum of the digits of the number while the latter accepts a low and high number range.

The program returns a dictionary with the recursive sum as the keys and the number count as the values.

3 0
3 years ago
1. What are the two main functions of an operating system?
sesenic [268]

Answer:

(1) manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide services for applications software.

8 0
3 years ago
Other questions:
  • Blogs are typically written by large companies or organizations as a way to express formal, technical, or scholarly information
    5·2 answers
  • Can anyone help me with getting bash ubuntu on windows setup?
    15·1 answer
  • This type of method method performs a task and sends a value back to the code that called it:
    5·1 answer
  • Belvedere Street is parallel to St. Anthony Street. Davidson Street is perpendicular to River Street. River Street is parallel t
    11·1 answer
  • When you _____ a scroll bar, a shortcut menu appears with commands related to the scroll bar
    10·1 answer
  • All NATE specialties are offered at two levels, A. journeyman and master. B. installation and service. C. apprentice and journey
    7·1 answer
  • Which code must be included to use Turtle Graphics?
    14·2 answers
  • PowerPoint is best described as:
    13·1 answer
  • Select one Layer 2 or wireless WAN technology presented in Lesson 3. Elaborate on its characteristics, pros and cons, and common
    13·1 answer
  • HELP ASAP
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!