answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
2 years ago
6

Classify the given items as belonging to the public domain or protected by copyright law.

Computers and Technology
2 answers:
irina1246 [14]2 years ago
6 0

Answer-A book published in 1758 can be classified as belonging to the public domain. According to U.S laws, works or creations published in the U.S before 1924 might be deemed expired.  

As a bloggers, when you hit the publish button, any work created is protected by copyright and the material inside is yours.

A music record from the 1960s - protected by copyright law

An infographic made by the federal government - public domain

A photograph taken in 1980 - protected by copyright law

max2010maxim [7]2 years ago
3 0

Anything protected by the copyright law has a legal concept that grants artists or authors control over their creations. On the other hand, anything in the public domain is not protected by intellectual property laws and the public owns these works.

A book published in 1758 can be classified as belonging to the public domain. According to U.S laws, works or creations published in the U.S before 1924 might be deemed expired.  

As a bloggers, when you hit the publish button, any work created is protected by copyright and the material inside is yours.

A music record from the 1960s - protected by copyright law

An infographic made by the federal government - public domain

A photograph taken in 1980 - protected by copyright law

You might be interested in
Write an expression that will cause the following code to print "I am a teenager" if the value of userAge is less than 20. Zyboo
VikaD [51]

Answer:

Replace

if userAge > 20

with

userAge > 19

Explanation:

if userAge > 20  checks if age is 21, 22, 23, 24........

The else condition which prints "I am a teenager" checks if age is 20, 19, 18....

Notice that 20 is inclusive of the else condition; this shouldn't be because for userAge to be less than 20, 20 isn't inclusive

To solve this,

Replace if userAge > 20 with userAge > 19

So that, the else

The else condition which prints "I am a teenager" checks if age is 19, 18, 17, 16....

6 0
2 years ago
A major clothing retailer has requested help enhancing their online customer experience. How can Accenture apply Artificial Inte
Harrizon [31]

Answer:

Option D

Explanation:

Artificial intelligence is a technology where the information gathered in the past is processed for the future actions.

Here, based on the preferences of customer in the past and purchase history, AI can suggest the customer new products and services

Hence, option D is correct

3 0
2 years ago
How can we make our programs behave differently each time they are run?
tensa zangetsu [6.8K]

Answer:

By given the right speech as much as the answers must be

Explanation:

By given the right speech as much as the answers must be

7 0
1 year ago
(1) Prompt the user to enter five numbers, being five people's weights. Store the numbers in an array of doubles. Output the arr
Mashutka [201]

Answer:

weights = []

total = 0

max = 0

for i in range(5):

   weight = float(input("Enter weight " + str(i+1) + ": "))

   weights.append(weight)

   total += weights[i]

   if weights[i] > max:

       max = weights[i]

average = total / 5

print("Your entered: " + str(weights))

print("Total weight: " + str(total))

print("Average weight: " + str(average))

print("Max weight: " + str(max))

Explanation:

Initialize the variables

Create a for loop that iterates 5 times

Get the values from the user

Put them inside the array

Calculate the total by adding each value to the total

Calculate the max value by comparing each value

When the loop is done, find the average - divide the total by 5

Print the results

6 0
2 years ago
A feature on a new computer with Windows preinstalled. When you take it out of the box and turn it on, you will be greeted with
BlackZzzverrR [31]

Answer:

Explanation:

In the newer versions of windows, there are a variety of sign-in methods, these include facial recognition, fingerprint scanner, username & password, or Microsoft email sign in. The choice is yours at the end of the Out-of-box experience which is the entire setup experience that the consumer has when first preparing the new windows installation on the computer that they have. Some of the options may require additional hardware on your PC such as a fingerprint scanner or a webcam for facial recognition.

6 0
2 years ago
Other questions:
  • An mp3 takes up about 16 kilobytes of memory per second of music. if you owned a one terabyte hard drive and filled it with only
    15·1 answer
  • During college jesse spent four semesters studying abroad in other parts of the world how could jesses time abroad benefit his e
    5·2 answers
  • Browsers ignore any values specified for the left or top properties under _____ positioning.
    11·2 answers
  • Based on virtualization technologies, how many types can we classify them? Please give a brief statement on each of them?
    14·1 answer
  • A spreadsheet keeps track of student scores on all the exams in a course. Each row of the spreadsheet corresponds to one student
    14·1 answer
  • Write a method that accepts a String object as an argument and displays its contents backward. For instance, if the string argum
    10·1 answer
  • Of these two types of programs:a. I/O -bound b. CPU -bound which is more likely to have voluntary context switches, and which is
    6·1 answer
  • Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
    5·1 answer
  • Find true or false. A hacker is hacking software with access in sensitive information from your computer​
    9·1 answer
  • What are the primary IP addresses for DNS servers hosted on the x128bit, iskytap and cloudparadox domains
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!