1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zina [86]
2 years ago
6

Javier inherited rights to his grandfather’s writing, which was protected by copyright law that expired a few years later. What

happens to his grandfather’s work in this situation?
A.
It is only protected by fair use rules.

B.
It enters public domain.

C.
The copyright is classified differently.

D.
It is removed from sale.
Computers and Technology
1 answer:
Yanka [14]2 years ago
3 0

Answer:

C. The copyright is classified differently.

Explanation:

Since it is a writing and not a business or a car brand or a computer company like that high stuff that is very important it wouldn't effect you since you are family and since he left you rights to the copyright you can re copyright it after  it is expired with enough proof that he gave you rights.

You might be interested in
Network in which every computer is capable of playing the role of the client, server or both at the same time is called *
zheka24 [161]

Answer:

peer to peer

Explanation:

Here, we want to select which of the options best answer the question.

The answer is peer to peer

The peer to peer network configuration is a type in which each computer can work as a client, a server or both

Thus , in a peer to peer network configuration, we can have the computer systems on this network having the possibility of working as either the client, the server or both of them simultaneously

6 0
3 years ago
What is the purpose of news services
suter [353]
In my opinion they are meant for putting fear into everyone who watches them

i hope this helped
7 0
4 years ago
How many four-digit personal identification numbers (PIN) are possible if the PIN cannot begin or end with a 0 and the PIN must
OLEGan [10]
 number of possible pins = 9 x 10 x 10 x 4 = 3600
3 0
3 years ago
Refer to the exhibit. A network administrator configures a named ACL on the router. Why is there no output displayed when the sh
nignag [31]

Answer:

The correct answer to the following question is ACL name is the case sensitive.

Explanation:

ACL name is unique, alphanumeric and case sensitive that's why the router deals like the access_network, the ACCESS_NETWORK as it if they are the two separates ACL's.

That's why ACL always has the unique identities.

7 0
3 years ago
Which file is used to determine which tty devices the root user is allowed to log in to?
aleksley [76]
The <span> file that is used to determine which tty devices the root user is allowed to log in to is: </span><span>/etc/<span>securetty
</span></span>etc/securetty<span> is consulted by pam_securetty module in order to decide from which virtual terminals root is allowed to login from. You can limit the access to root account by </span>disabling root logins at the console by editing the /etc/securetty<span> file. </span>
7 0
3 years ago
Other questions:
  • Website reputation is an important part of page quality (PQ) rating. Reputation can justify the Highest rating and the Lowest ra
    15·1 answer
  • Need help developing code!!
    9·1 answer
  • Which is the best practice for placing graphics on a slide?
    6·2 answers
  • When using ntfs as a file system, what can be used to control the amount of hard disk space each user on the machine can have as
    8·1 answer
  • What’s the most popular operating system
    9·2 answers
  • Write a function in Java to implement the following logic:
    13·1 answer
  • Can some one please help
    9·1 answer
  • How does technology affect our daily lives essay
    9·2 answers
  • Make and run a Python program which:
    13·1 answer
  • Give five example of a dedicated device ​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!