answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
2 years ago
6

Classify the given items as belonging to the public domain or protected by copyright law.

Computers and Technology
2 answers:
irina1246 [14]2 years ago
6 0

Answer-A book published in 1758 can be classified as belonging to the public domain. According to U.S laws, works or creations published in the U.S before 1924 might be deemed expired.  

As a bloggers, when you hit the publish button, any work created is protected by copyright and the material inside is yours.

A music record from the 1960s - protected by copyright law

An infographic made by the federal government - public domain

A photograph taken in 1980 - protected by copyright law

max2010maxim [7]2 years ago
3 0

Anything protected by the copyright law has a legal concept that grants artists or authors control over their creations. On the other hand, anything in the public domain is not protected by intellectual property laws and the public owns these works.

A book published in 1758 can be classified as belonging to the public domain. According to U.S laws, works or creations published in the U.S before 1924 might be deemed expired.  

As a bloggers, when you hit the publish button, any work created is protected by copyright and the material inside is yours.

A music record from the 1960s - protected by copyright law

An infographic made by the federal government - public domain

A photograph taken in 1980 - protected by copyright law

You might be interested in
A script sets up user accounts and installs software for a machine. Which stage of the hardware lifecycle does this scenario bel
DochEvi [55]

Answer:

deployment phase

Explanation:

This specific scenario belongs to the deployment phase of the hardware lifecycle. This phase is described as when the purchased hardware and software devices are deployed to the end-user, and systems implemented to define asset relationships. Meaning that everything is installed and set up for the end-user to be able to use it correctly.

6 0
2 years ago
Can someone please help me with this
inessss [21]

the first question answer is true

the second question answer is true

please brainliest me i just took the test so i know those 2 answers are correct!

3 0
2 years ago
Cleo finds herself frequently searching for messages from particular senders or with specific subjects. What should she create
blsea [12.9K]

Answer:

The element she can create to increase efficiency for these searches is:

Search Folder

Explanation:

The reasons behind this are that index in the first place indexes by themselves don't facilitate the job of looking quickly at a certain e-mail. Because they show the user all of them. Second, outlook rules are certain guidelines that the user can program to group certain emails and send them to certain folders. However, they don't play a crucial part in quick searches. We have two options that could make this: instant search of folder search. Instant search works by general categories, of emails, events, and contacts. But search folders give the user certain characteristics the emails can have so the user can choose which emails to see. Thus, this is the correct answer.

8 0
2 years ago
Explain briefly why the crowd sourcing technique could help a single individual with a difficult personal decision.
atroni [7]
Crowdsourcing<span> is the process of getting work or funding, usually online, from a crowd of people. The word is a combination of the words 'crowd' and 'outsourcing'. The idea is to take work and outsource it to a crowd of workers.</span>
4 0
2 years ago
15. It is the process of capturing data or translating information to recording format
Helen [10]

Answer:

A Documentation, hope this helps.

5 0
2 years ago
Other questions:
  • Write a program that prints the U.S. presidential election years from 1792 to present day, knowing that such elections occur eve
    9·1 answer
  • while investigating the settings on your SOHO router, you find two IP address reported on the devices's routing table, which is
    5·1 answer
  • "In about 100 words, discuss the technologies that Walmart’s trucking fleet might use to better manage their operations. Include
    7·1 answer
  • Sara is using her personal laptop (which is password protected) at a "hotspot" at a local cafe with wifi access. She is in the m
    7·1 answer
  • Which of the following image file formats uses lossy file compression?
    7·1 answer
  • given the numerical value 1010101.11, which of the following number systems is most likely represented.
    11·1 answer
  • _____________ data is what is translated to digital format so it can be stored in a computer.
    10·1 answer
  • A series of gentle often open-ended inquiries that allow the client to progressively examine the assumptions and interpretations
    14·1 answer
  • Consider a disk that rotates at 3600 rpm. The seek time to move the head between adjacent tracks is 2 ms. There are 32 sectors p
    5·1 answer
  • Write a function named shout. The function should accept a string argument and display it in uppercase with an exclamation mark
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!