1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madreJ [45]
3 years ago
10

While developing a program, you find a similar project that someone has created and posted online. It contains a number of eleme

nts (e.g., images, music, code segments, etc.) that you would like to integrate into your own project. Under what conditions may you reuse these elements in your work?
A. You may never reuse someone else’s work.
B. You may reuse any elements that are posted publicly online as long as credit is given to their creator.
C. You may only reuse elements for which the original owner has granted a license to reuse, such as the Creative Commons Share Alike license.
D. You may always reuse anything that is posted publicly or privately online.
Computers and Technology
1 answer:
Hunter-Best [27]3 years ago
3 0

The condition under which you may reuse these elements in your work is: C. You may only reuse elements for which the original owner has granted a license to reuse, such as the Creative Commons Share Alike license.

<h3>What is a creative commons license?</h3>

A creative commons license can be defined as a public copyright license which allows for the free distribution of a copyright protected material and it can only be used by the intellectual property (IP) owner.

<h3>Types of creative commons license.</h3>

Generally, there are four (4) main types of creative commons and these include the following;

  • Attribution
  • Share Alike
  • Non-Commercial
  • No Derivative Works

In conclusion, we can deduce that an external user may only reuse elements for which the original owner or intellectual property (IP) owner has granted a license to reuse, such as the Share Alike license of Creative Commons.

Read more on copyright law here: brainly.com/question/1078532

You might be interested in
17. Which of the following is not a visible section in a File Explorer window?
andrew-mc [135]

Answer: D.)

Explanation: Clipboard

4 0
3 years ago
Which Internet protocol (IP) packet fragmentation header field specifies where the fragment belongs in the original datagram
Yanka [14]

An Internet protocol (IP) packet fragmentation header field which specifies where the fragment belongs in the original datagram is the fragment offset.

<h3>What is the TCP/IP model?</h3>

The TCP/IP model is known as the Internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model and it can be defined as a standard framework that is designed and developed for the transmission (prepare and forward) of information on the Internet.

In the TCP/IP model, a fragment offset simply refers to an Internet protocol (IP) packet fragmentation header field which is used to specify where the fragment belongs in the original datagram.

Read more on Internet protocol here: brainly.com/question/17387945

#SPJ1

8 0
2 years ago
19. Which network topology is a combination of two or more types of physical or two or more types of logical topologies? A. Poin
marishachu [46]

Answer:b)-Hybrid topology

Explanation:

Hybrid is a type of topology which uses different types of topology. Hybrid topology uses the mix of ring, bus, mesh, star and tree topology. This topology is reliable as troubleshooting is easy without affecting other networks. Also, more network can be easily added to it without causing much interference.

The major disadvantage of hybrid topology is its complexity.

4 0
3 years ago
How does teamwork help in developing a quality outcome?
zvonat [6]
Because when you work together, it makes a stronger bond and that gives you a quality outcome.



I may be wrong.. (*:
4 0
4 years ago
Part 1: 1) Write a C program getPhoneNumber.c that accepts a phone number from the user in the form XXX-XXX-XXXX, and then displ
Allushta [10]

Answer:

Following are the program, which can be below:

#include <stdio.h> //defining header file

#include <string.h>//defining header file

int main() //defining main method

{  

int x=0,y=0,l=0; //defining integer variable

char phone_number[32] = {'\0'}; //defining char array

printf("Enter a date(xxx-xxx-xxxx): \n "); //print message

printf("Example: 000-000-0000 \n :"); //print message

scanf("%s",phone_number); // taking input from user

printf("%s\n",phone_number); //print number

for(x=0; phone_number[x]; x++) // check character by character

{

if(x==0) // put ( on first character

{

l = strlen(phone_number); //calculate length  

phone_number[l] = '\0'; //check number  

for(y=l; y>=1; y--) //loop to calculate a value

{

phone_number[y] = phone_number[y-1]; //holding value in array

}

phone_number[y] = '('; //assigning bracket

}

if(phone_number[x] == '-') // put ) at first -

{

phone_number[x] = ')'; //assigning bracket

break;

}

}

printf("You entered %s\n",phone_number); //print all value with brackets

}

Output:

Enter a date(xxx-xxx-xxxx):  

Example: 000-000-0000  

:011-123-4567

011-123-4567

You entered (011)123-4567

Explanation:

The description of the above program can be defined as follows:

  • In the above program three integer variable "x, y, and l" and a character array "phone_number" is declared.
  • In the char, variable user input the value and print its value by using the print function.
  • In the next line, a for loop is declare, that checks user input value character by character and counts its length by using the strlen() method, inside the loop a conditional statement is used.
  • In the condition statement check, the values are not equal to null and provide brackets in the inserted value.
8 0
3 years ago
Other questions:
  • If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
    11·1 answer
  • Which acronym describes technology in which all or most of a deviceâs electronic circuitry is on a single microchip?
    12·1 answer
  • 10. How does a command work in conjunction with a switch?
    14·1 answer
  • How to find no of Distinct triangles in a polygon?
    10·1 answer
  • Who are the founders of Microsoft?
    5·1 answer
  • Buying what you want rather than what you need is an example of:
    12·1 answer
  • Methods are used to define an object's behavior. True False
    8·1 answer
  • g Given the information below, answer each part of the question: Page Size: 4 KB a. How many bits are in the Page Offset
    11·1 answer
  • The platform in E-Learning refers to:
    9·1 answer
  • When a support agent does not know the answer to a question, a good incident management strategy is to tell the user ____.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!