answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksenya-84 [330]
2 years ago
5

Lucy is completing a project as part of a science class using materials she found online. Which of the following is MOST LIKELY

to lead to legal consequences? A. Modifying a piece of open source software. B. Using open access research for which she does not acquire a license. C. Failing to publish her work under a Creative Commons license. D. Using images posted online by another student without permission or citation.
Computers and Technology
1 answer:
const2013 [10]2 years ago
7 0

Answer:

D.

Explanation:

Most students would fail to realize that the pictures they use also need citations so that would be the MOST LIKELY to lead to legal consequence.

You might be interested in
A Salesforce administrator adding a recommendations carousel component in Community Builder. The page displays correctly in Comm
disa [49]

Answer:

The page changes with the recommendation component have NOT been published.

Explanation:

The community builders are generally used to identify different opportunities by utilizing the necessary creativity, analysis and strategies. This will ensure that the objectives are achieved at the end of the day. Based on the problem encountered during the operation, it shows that the necessary page changes were not published.

4 0
2 years ago
What is one effective way for employees to keep their skillsets current?
lys-0071 [83]
They are probably looking for B.  subscribing to journals is a good way of keeping up with what's happening in any field.

Of course, a very carefully curated professional network online is great for this too (but they said "personal" so that's not the answer)

Employers generally prefer that employees WORK as often as possible, so even though JUDICIOUS use of social media is a great way to keep current, D isn't the answer either.

Blogging about personal experiences is not necessarily going to teach you anything about work, though blogging professionally can be useful in gathering response from your readership
4 0
2 years ago
Read 2 more answers
Consider whether there are additional components that could be added to the IPv4 protocol to enhance its usefulness. What are th
geniusboy [140]

Answer:

There are no additional components that can be added to the IPv4 protocol to improve its utility

Explanation:

The IPv4 protocol was developed in 1983 and is still the most widely used version worldwide. It consists of a 32-bit binary number that is normally represented in decimal notation, with four digits separated by dots that take values between 0 and 255.

This system limits the IPv4 protocol to 4,000 million different addresses, a figure that in the eighties seemed sufficient but that in practice has been scarce due to the revolution of mobile devices and the impending development of the Internet of Things ( IoT) that will trigger the number of devices connected to the network.

So, there are no additional components that can be added to the IPv4 protocol to improve its utility, since the world is running out of IPv4 addresses and is being replaced by IPv6.

Hope this helps!

5 0
2 years ago
A 1.17 g sample of an alkane hydrocarbon gas occupies a volume of 674 mL at 28°C and 741 mmHg. Alkanes are known to have the gen
Nina [5.8K]

Answer:

C3H8

Explanation:

Step 1:

Data obtained from the question. This includes the following:

Mass of alkane = 1.17g

Volume (V) = 674 mL

Temperature (T) = 28°C

Pressure (P) = 741 mmHg.

Gas constant (R) = 0.08206 atm.L/Kmol

Step 2:

Conversion to appropriate unit.

For Volume:

1000mL = 1L

Therefore, 674mL = 674/1000 = 0.674L

For Temperature:

Temperature (Kelvin) = Temperature (celsius) + 273

Temperature (celsius) = 28°C

Temperature (Kelvin) = 28°C + 273 = 301K

For Pressure:

760mmHg = 1atm

Therefore, 741 mmHg = 741/760 = 0.975atm

Step 3:

Determination of the number of mole of the alkane..

The number of mole of the alkane can be obtained by using the ideal gas equation. This is illustrated below:

Volume (V) = 0.674L

Temperature (T) = 301K

Pressure (P) = 0.975atm

Gas constant (R) = 0.08206 atm.L/Kmol

Number of mole (n) =?

PV = nRT

n = PV /RT

n = (0.975 x 0.674)/(0.08206x301)

n = 0.0266 mole

Step 4:

Determination of the molar mass of the alkane.

Mass of alkane = 1.17g

Number of mole of the alkane = 0.0266mole

Molar Mass of the alkane =?

Number of mole = Mass/Molar Mass

Molar Mass = Mass/number of mole

Molar Mass of the alkane = 1.17/0.0266 = 44g/mol

Step 5:

Determination of the molecular formula of the alkane.

This is illustrated below:

The general formula for the alkane is CnH2n+2

To obtain the molecular formula for the alkane we shall assume n = 1, 2, 3 or more till we arrive at molar Mass of 44.

When n = 1

CnH2n+2 = CH4 = 12 + (4x1) = 16g/mol

When n = 2

CnH2n+2 = C2H6 = (12x2) + (6x1) = 30g/mol

When n = 3

CnH2n+2 = C3H8 = (12x3) + (8x1) = 44g/mol

We can see that when n is 3, the molar mass is 44g/mol.

Therefore, the molecular formula for the alkane is C3H8.

7 0
2 years ago
When you connect to an unsecured wireless network, what might dishonest or unscrupulous computer users try to do?
loris [4]

Answer:

Hackers can snoop on data sent over your network.

Hackers can use your network to access your computer's files and system information.

Explanation: Unsecured Wireless connections are wireless connections which are have no passwords they are open to the general public,such networks can be very risky to use as it gives easy access to dishonest persons who can manipulate that opportunity to SNOOP ON DATA SENT OVER YOUR NETWORKS. They can use this hacking to fraudulently steal from your bank account and obtain your private information.

8 0
2 years ago
Other questions:
  • The adjusted cell references in a copied and pasted formula are called ____ cell references.
    7·1 answer
  • Janice is unsure about her future career path she has grown up on her family farm but she is also interested in medicine Janice
    5·1 answer
  • Mr. Cooper would like to customize his Excel software so his students can create an electronic graph in Excel for their lab repo
    6·1 answer
  • Which description of the plain text file format is most accurate?
    11·2 answers
  • Which of the following is technically not a programming language?
    12·2 answers
  • rite a method so that the main() code below can be replaced by simpler code that calls method calcMilesTraveled(). Original main
    7·1 answer
  • Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key sh
    10·1 answer
  • Define a method named roleOf that takes the name of an actor as an argument and returns that actor's role. If the actor is not i
    8·1 answer
  • The elements of an integer-valued array can be initialized so that a[i] == i in a recursive fashion as follows: An array of size
    10·1 answer
  • Is cheque money? give reason​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!