answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
2 years ago
6

Classify the given items as belonging to the public domain or protected by copyright law.

Computers and Technology
2 answers:
irina1246 [14]2 years ago
6 0

Answer-A book published in 1758 can be classified as belonging to the public domain. According to U.S laws, works or creations published in the U.S before 1924 might be deemed expired.  

As a bloggers, when you hit the publish button, any work created is protected by copyright and the material inside is yours.

A music record from the 1960s - protected by copyright law

An infographic made by the federal government - public domain

A photograph taken in 1980 - protected by copyright law

max2010maxim [7]2 years ago
3 0

Anything protected by the copyright law has a legal concept that grants artists or authors control over their creations. On the other hand, anything in the public domain is not protected by intellectual property laws and the public owns these works.

A book published in 1758 can be classified as belonging to the public domain. According to U.S laws, works or creations published in the U.S before 1924 might be deemed expired.  

As a bloggers, when you hit the publish button, any work created is protected by copyright and the material inside is yours.

A music record from the 1960s - protected by copyright law

An infographic made by the federal government - public domain

A photograph taken in 1980 - protected by copyright law

You might be interested in
A data center designer requested additional lighting for the entrance to the data center as well as the removal of a object whic
Ira Lisetskai [31]

Answer:

SURVEILLANCE-SPECIFIC DESIGN.

Explanation:

Defensible space offers a series of architectural guidelines that can be used in the design of new urban residential complexes to promote both the residential group’s territorial claim to its surroundings and its ability to conduct natural surveillance. The designs are: site interrelationship design, site design, street design and surveillance-specific design.

Surveillance-specific design can be used to increase general visibility by providing adequate lighting, by reducing or eliminating physical barriers to visibility, and by the visibility-promoting location of key areas (entrances, lobbies, elevator waiting areas, parking areas e.t.c.) so as to be directly visible from as many viewpoints as possible.

Since the data center designer requested additional lighting for the entrance to the data center as well as the removal of a object which is blocking security's view of the entrance, then it is an example of SURVEILLANCE-SPECIFIC DESIGN.

6 0
2 years ago
When this program is compiled and executed on an x86-64 Linux system, it prints the string 0x48\n and terminates normally, even
Alexxandr [17]

Answer:

I get 0x55 and this the linking address of the main function.

use this function to see changes:

/* bar6.c */

#include <stdio.h>

char main1;

void p2()

{

printf("0x%X\n", main1);

}

Output is probably 0x0

you can use your original bar6.c with updaated foo.c

char main;

int main() // error because main is already declared

{

  p2();

   //printf("Main address is 0x%x\n",main);

  return 0;

}

Will give u an error

again

int main()

{

  char ch = main;

  p2(); //some value

  printf("Main address is 0x%x\n",main); //some 8 digit number not what printed in p2()

  printf("Char value is 0x%x\n",ch); //last two digit of previous line output

  return 0;

}

So the pain in P2() gets the linking address of the main function and it is different from address of the function main.

Now char main (uninitialized) in another compilation unit fools the compiler by memory-mapping a function pointer on a char directly, without any conversion: that's undefined behavior. Try char main=12; you'll get a multiply defined symbol main...

Explanation:

5 0
2 years ago
Do all of the packets in your sent messages always follow the same path? If not, describe at least two different paths packets t
Lemur [1.5K]

Answer:

All the message I sent were from the same routers

Explanation:

All the message I sent were from the same routers

5 0
2 years ago
Read 2 more answers
An e-commerce client is moving from on-premise, legacy systems to a cloud-based platform. During the transition, the client is a
Talja [164]

The way in which this client is benefiting from switching to a cloud-based enterprise platform is in terms of<em><u> efficiency.</u></em>

An enterprise platform is a base upon which companies can<u> build on the technology they have</u>. Some of the many benefits of this include:

  • <em>Efficiency </em>
  • Simplicity
  • Expandability

and many more. A cloud-based enterprise platform allows a company to keep up to modern-day standards and stay competitive.

A cloud-based enterprise platform allows all of the users to access the data remotely, making work much more simple and removing the space limitations of on-site legacy systems, which allows the client to expand and hire new workers.

One of the ways in which this client is benefiting from switching to a <em>cloud-based enterprise platform</em> is in terms of efficiency. By removing the on-site model of work, this client will allow her workers to access the database and interchange information which other sectors all from a single server, <u>increasing efficiency greatly.</u>

To learn more visit:

brainly.com/question/24053883?referrer=searchResults

4 0
2 years ago
Write a code segment to change the name of the Thing object something such that the new name consists of the old name with one c
ololo11 [35]

Answer:

import random

def name_change( name: list ) -> list :

   choice = random.choice( name )

   choice_index = name.index( choice )

   name.pop( choice_index )

   return name

Explanation:

The python source code above makes use of the random package to select an item from a list in the function "name_change" and the index of that item is gotten fro the list and popped from the list "name", then the name is returned.

To call the function, assign it to a variable and add a list ( must be a list ) as its argument then print the result.

6 0
1 year ago
Other questions:
  • 3. Of the following pieces of information in a document, for which would you most likely insert a mail merge field? A. First nam
    13·2 answers
  • Let's assume that the smallest possible message is 64 bytes (including the 33-byte overhead). if we use 100base-t, how long (in
    10·1 answer
  • Leo lives in a two-story home in an upscale neighborhood, drives a brand-new sports car, and makes more than $250,000 per year.
    13·2 answers
  • Which of the following would be a considered a want rather than a need for most people?
    15·1 answer
  • Fill in the blank; "As well as their traditional role of computing data, computers are also extensively used for..."
    14·1 answer
  • BlockPy: #35.2) Animal Splits Write a function all_cats that consumes a comma-separated string of animals and prints whether all
    15·1 answer
  • Lin is booting up his computer, and during the boot process, the computer powers down. After several unsuccessful attempts to bo
    12·1 answer
  • Write a program to help you feed your friends at a party by doing some math about square pizzas. Assume the grader defines a str
    12·1 answer
  • A news channel runs a two-minute story on phishing scams. The report features the testimonies of a phishing victim and a compute
    7·1 answer
  • The user interface contains two types of user input controls: TextInput, which accepts all characters and Numeric Input, which a
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!