1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
2 years ago
14

Hello. I really need this done ASAP. Don't scroll down. JUst look please.

Computers and Technology
2 answers:
rosijanka [135]2 years ago
8 0

Answer: i can not do the 2nd part

Explanation:

The four factors judges consider are:

the purpose and character of your use

the nature of the copyrighted work

the amount and substantiality of the portion taken, and

the effect of the use upon the potential market.

Burka [1]2 years ago
7 0

Answer:

part 1

The four factors judges consider are:

the purpose and character of your use

the nature of the copyrighted work

the amount and substantiality of the portion taken, and

the effect of the use upon the potential market.

Part 2

the author toils without copying from someone else

the work must be original

Explanation:

You might be interested in
Please help i really need to turn this in already
Step2247 [10]

V = √P*R

RED

It doesn't really do anything active wise but it is used to reduce current flows, adjust signal levels, and to divide voltage.

7 0
3 years ago
When using IPsec, how can you ensure that each computer uses its own private key pair?
aalyn [17]

Answer:

By using digital certificates.

Explanation: Digital certificate are used for the following:

1) Digital certificates are used in public key cryptography functions; they are most commonly used for initializing secure SSL connections between web browsers and web servers.

2) Digital certificates can also be used for sharing keys to be used for public key encryption and authentication of digital signatures.

5 0
3 years ago
What is the relevance of Address Block?​
klemol [59]

Answer: The relevance of Address Block is Yoda.

Explanation: Yoda is the main course for the Address Block.

5 0
3 years ago
Question 4 of 5
ikadub [295]

Answer:

A. Lifelong Learning.

8 0
3 years ago
Read 2 more answers
7) The small slots on the front, back, or side of your computer that allow you to connect devices (such as a keyboard, mouse, or
wolverine [178]

Answer:

Ports

Explanation:

ports are interface or connection point between a computer and external devices. There are slots in all the sides of a computer such as Ian, usb, HDMI, etc. These ports are connection point of mouse, keyboard , external hdd to the computer.

8 0
3 years ago
Other questions:
  • One in five teens have been tricked by someone online:
    14·2 answers
  • What is scratch in information system .
    14·1 answer
  • 8. Seleccione la respuesta correcta de acuerdo con las opciones que aparece a continuación:
    11·1 answer
  • 5. The hazardous component in most antifreeze is _____, which is extremely toxic to humans and animals. A) Calcium Carbonate B)
    13·2 answers
  • You have a site (Site1) that has about 20 users. For the last few months, users at Site1 have been complaining about the perform
    9·1 answer
  • A parameter is a numerical measure that describes a characteristic of a sample. Choose One • 4 points True False
    6·1 answer
  • In this problem, you will write three methods to:
    12·1 answer
  • Write a C program to input basic salary of an employee and calculate gross salary according to given conditions.
    11·1 answer
  • Line charts are best used for
    15·2 answers
  • each data mining technique has its advantages and limitations. which data mining technique mimics the neural structure of the br
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!