Which of the following situations would notqualify for the fair use exception to United States copyright law?A) Google posts thumbnail images of books in the Google Book Search Project.B) A student copies a photograph of his favorite band from a Web site created by the band's record label andplaces it on the student's personal Web site. C) A professor clips a newspaper article just before class and distributes copies of it to his class.D) A journalist quotes a paragraph from a book in a review of the book.

Answers

Answer 1

Answer:

C. A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.

Explanation:

Because this is deemed an offence as the student never got a formal copyingpermit


Related Questions

What are some examples of the impact of the Internet boom?
A. We have instant 24-hour access to news and entertainment.
B. We can travel around the world faster than we did 100 years ago.
C. We can attend a university from our homes.
D. We can sell used items to people outside of our local regions.

Answers

A umm I need 20 or more so WAP

Answer:

all options -{ we can travel around the world faster than we did 100 years ago)

Explanation:

see the attachment

What are all the folders located on the DOCK called?

Answers

Answer:

Folders on the DOCK bar are called stacks

An Agile Team decides they want to use pair programming in future Iterations. Where should this be captured? g

Answers

Answer:

The decision to use pair programming by an Agile Team should be captured in their Inspect and Adapt meeting notes.  

Explanation: The underlying principle for having an agile team that the team is committed to constant incremental and or progressive improvement.

Inspect and Adapt Meeting Notes are notes which hold the summary of past achievements which hold and records of things to do going forward in order to ensure that there is progress and improvement over the last set of objectives.

These notes are usually taken at the Inspect and Adapt meeting. This is simply a meeting held at the end of each project milestone. An agile team during this meeting will review its performance, agree and document how it can be more effective.

Pair programming is also an Agile practice in the parlance of software development. Instead of the regular method where an individual is tasked with the development of an application, in this case, two programmers are tasked with the development of one App.

Sometimes this method is used during Extreme Programming (XP)

Cheers!

When citing an Internet source:__________. a. it is ok to omit quotation marks if you change some words in the original sentence. b. it is ok to omit quotation marks when the source is a URL. c. it is ok to omit quotation marks for a paraphrase of the source. d. it is ok to omit quotation marks when there is no way to paraphrase.

Answers

Answer:

c. it is ok to omit quotation marks for a paraphrase of the source.

Explanation:

Plagiarism can be defined as the act of representing or using an author's work, ideas, thoughts, language, or expressions without their consent, acknowledgement or authorization.

In order to avoid plagiarism, it is very important and necessary to reference or cite the source of the informations and data.

However, when citing an Internet source, it is ok to omit quotation marks for a paraphrase of the source because the idea, thoughts or intellectual work as being rephrased.

Fill in the blank

A is a reserved word and can only be used for its intended purpose within a python program

Answers

Answer:

Keywords

Explanation:

In computer language, a word that cannot be used as an identifier is called reserved word e.g function, name of a variable or label, all these are reserved from use, while in python keywords are called  reserved words, they have specific purpose and meaning. They cannot be used for anything else apart from their specific purposes. Python keywords are always available hence there is no need to import them into code.

Answer: keyword

Explanation:

Simply put, a Python keyword cannot be used outside of its intended purpose. It's reserved for it's intended purpose within a Python program. The person above wasn't necessarily wrong, they just made the term plural. Be sure to enter "keyword", as written.

I hope this helped!

Good luck <3

1. When should the architect begin the analysis?
2. What are the activities the architect must execute?
3. What is the set of knowledge domains applied to the analysis?
4. What are the tips and tricks that make security architecture risk assessment easier?

Answers

Answer: c

Explanation:

Because you divide the end to the five

8.

Question

An Internet connection problem for customers is found to be outside

a carrier's regional office. As a result, which area needs

troubleshooting?


Answers

Answer:

local loop

Explanation:

The local loop is a term often used in computer or communication networking, which is used to describe a form of actual connection line, that joins two points; the customer's starting point and the communication carrier's end or border point.

Hence, the area that needs troubleshooting when an Internet connection problem for customers is found to be outside a carrier's regional office, is known as LOCAL LOOP.

A list (in Python) can have

Answers

Answer:

It can have any number of items and they may be of different types (integer, float, string etc.). A list can also have another list as an item. This is called a nested list

Explanation:

how much heat is required to convert 1 gm of ice into steam​

Answers

Here's an answer a certified website gave me when I asked the same question:

Heat required in converting 1g of ice at −10∘C into steam at 100∘C is: latent heat of fusion= 80 cal/g80 cal/g. latent heat of vaporization=540 cal/g

Hopefully this helps

In SQL the statement select*from R,S is equivalent to:_______(a) Select * from R natural join S(b) Select * from R cross join S(c) Select * from R union join S(d) Select * from R inner join S

Answers

Answer: (b) Select * from R cross join S

Explanation: The SQL query command, Select * from R, S selects each rows from table R and merges combines it with each row of table S such that the number of columns increases. The merging could be said to be horizontal in nature since it results in an increased number of data columns. The Cross join method produces the same exact result with the output all columns in both tables (R and S). The inner join combines rows in tables as well but requires that both tables have a matching column values. The union join merges data the data in both tables vertically and will not produce the same output as the SELECT * FROM R, S statement.

Which of these field types allows multiple, non-exclusive options?

Answers

Question:

Which of these field types allows multiple, non-exclusive options?

A. multi-part

B. checkbox

C. text

D. radio button

E. button

Answer:

The correct option is B) Checkboxes

Explanation:

Field types is a terminology often associated with Database Management.

A field type is often found in a data collection apparatus such a form. It's inherent quality or nature will determine the kind of data that it can collect.

Some field types allow for exclusive options. That is, in some data field types, it's impossible to select more than one option.

For example, a Button field type can only collect one type of value.

A Checkbox on the other can be configured to allow for multiple selections which may or may not be exclusive.

When working with Microsoft Access, for instance, you are required to select the name of the field and define the type of field data.

Cheers!

What is the meaning of ethics? Check all of the boxes that apply

Answers

Answer:

behavior that is good for everyone

following the rules

behaving in a way that would be easy to defend

Explanation:

THE ANSWER IS A, C, E

what is what is a network that is easy to maintain and cheap ​

Answers

Answer:

Click at the pic above and the ans will appear.

Hope it helps :)

which bus slot provides the highest video performance​

Answers

Answer: PCI, The PCI provides the highest performance

Why is it important to use systems analysis and design methodologies when building a system? Why not just build the system in whatever way seems to be "quick and easy"? What value is provided by using an "engineering" approach? Also, Give a specific example of an organization (not one listed in the book) that does a good job of this and why.

Answers

Answer:

It encourages the documentation of the building process and serves as a good reference point when information about the system is needed. It also helps in the testing of the various components of the system for efficiency.

Explanation:

System analysis is the total evaluation of the working components of a system. it shows the health or functionality of components and analyzes the effect of their relationship on the total system performance.

The design methodology is an engineering process to achieving a complete system build. It follows a procedure, documenting its parameters and observations as the system is implemented.

Example of organizations that follows these methods in building their systems are automobile industries like Honda.

It promotes the recording of the construction process and acts as a helpful resource when details about the system are required. Additionally, it aids in the efficiency testing of the system's many parts.

What is System Analysis?

"The process of evaluating a procedure or business to define its aim and purposes and build systems and procedures that will efficiently achieve them," according to the definition of systems analysis.

System analysis is done to investigate a system or its components in order to pinpoint its goals. It is a technique for solving problems that makes the system better and makes sure that all of its parts function effectively to serve their intended purposes.

Six essential steps can be taken while creating a system. Systems analysis entails specifying the problem, its causes, the proposed solution, and the information need that a system solution must satisfy.

System analysis has a wide range of advantages, but it may also have significant drawbacks. The danger of conducting excessive analysis, which may be expensive and time-consuming, is one of the key drawbacks that is frequently disregarded. Finding the ideal balance is consequently a necessary aspect of the analyst's job.

To read more about System Analysis, refer to - https://brainly.com/question/28145726

#SPJ2

Who is demonstrating entrepreneurship?
O A contractor makes money providing technical support to two different companies.
O A biomedical researcher finds a cure for a rare disease and shares it in a manuscript.
O Atechnician works on a certification to increase her chances of promotion.
O A recent graduate makes money helping teachers sell their lesson plans online.

Answers

Answer: D: A recent graduate makes money helping teachers sell their lesson plans online.

Explanation: I am in accounting and have taken it for 3 years.

Answer:

It is A

Explanation:

Since D was proven wrong ^ The only answer that makes sense is A

Cloud storage refers to the storage of data on ______.a. your mobile device.b. your desktop computer.c. an external drive.d. a server on the Interne.

Answers

Answer:

D.  server on the internet

Explanation:

The correct answer is:

Cloud storage refers to the storage of data on a server on the internet.

Every organization relies on data, In our daily job, we all make use of a huge amount of data(either in gigabytes or terabytes). And if you have a lot of files on your computer, it's probable that your computer may lose momentum and slow down, resulting in bad performance. While there are several external storage options available for storing and backing up your data, these devices are not infallible. Any incident, such as theft, or damage, might result in the loss of vital data.

This is where Cloud Storage comes into play. Cloud storage is a handy and dependable method of storing and retrieving information on the internet.

It is a cloud computing system in which data is stored on the server-side of the Internet and is managed and operated by a cloud computing provider. 

Therefore, from the above explanation, we can conclude that the correct Option is D

Learn more about Cloud Storage here:

https://brainly.com/question/23073532?referrer=searchResults

Set-In-Order includes making changes to the layout of the area.A) TrueB) False

Answers

Answer:

A) True

Explanation:

Set-In-Order is part of a 5S system approach of making a workplace to be well arranged so there will be smooth operation of employees and working conditions.

Set-In-Order specifically deals with entities in the workplace apparently labeled after being well arranged in their respective places.

Hence, it is TRUE that Set-In-Order includes making changes to the layout of the area.

Which option will likely be used by a traveling salesman? A tablet PC or a laptop A server or a laptop A laptop or a desktop A desktop computer or a server

Answers

Answer:

it is A

Explanation:

they are the smallest and can be easily moved.

hope this helps

The option that will likely be used by a traveling salesman is A tablet PC or a laptop. Thus the correct answer is A.

What is a salesman?

A salesman is referred to as an individual who mainly worked for selling, advertising, and promoting commodities in the market to the customers. They move from one location to another for their sale.

A tablet or laptop is considered a portable electronic device that works similar to any computer or desktop device which helps in making ease of business or day-to-day functions.

These devices are used by a salesman who used to travel as they are small in size which makes them easy to carry from one location to another without causing any trouble. They provide mobility to their user.

Therefore, option A tablet PC or a laptop is appropriate.

Learn more about laptops, here:

https://brainly.com/question/14252596

#SPJ2

Draw a flowchart or write pseudocode to represent the logic of a program that allows the user to enter a value for one edge of a cube. The program calculates the surface area of one side of the cube, the surface area of the cube, and its volume. The program outputs all the results.

Answers

Answer:

I'll answer this question with a Pseudocode

1. Start

2. Input Length

3. Surface Area1 = Length * Length

4. Surface Area2 = 6 * Surface Area1

5. Volume = Length * Length * Length

6. Print Surface Area1

7. Print Surface Area2

8. Print Volume

9. Stop

Explanation:

The first line starts the Pseudocode

The second line accepts input for Length of the cube

The third line calculates the surface area of 1 side

The fourth line calculates the surface area of the cube

The fifth line calculates the volume of the cube

The sixth to ninth line prints the calculated parameters

The Pseudocode ends on line 9

Is there an ethically acceptable reason to study and use the various attack methods described in this chapter? Can you think of any examples where ethical hacking occurs? What is your opinion of ethical hacking and can it be beneficial?

Answers

Answer:

Please see below  

Explanation:

Yes, there indeed is ethical justification for hacking certain computer systems. Since computer scientists are required to keep the system secure from external threats, so they make use of it when testing the network for potential loopholes that could make it vulnerable. It is beneficial in that it can help manifest the weaknesses present in the system, which can then be corrected for.

In safety matters what comes first the people or the film

Answers

Answer:

the people.

Explanation:

if somebody dies, the person in charge is going to get held responsible.

For what kind of shot is a fisheye lens most appropriate?

a. candid
b. panoramic landscape
c. large group
d. wildlife

Answers

Answer: B

Explanation: a fisheye lense is good for wide shots.

IDaaS is a ________-based identity and access management offering.
a) IaaS
b) PaaS
c) SaaS
d) DaaS

Answers

Answer:

c) SaaS

Explanation:

Identity as a Service is a company that provides authentication to access the data or resources to the ensured user. They provide access to the ensured users and helps in securing the data from any unauthorized involvement. The process of authentication is cloud-based and is available only for the subscribed users.

Jeremy Aronoff has purchased a new laptop. He wants to customize the operating system to meet his
needs. What types of tools should he use, and what can he do with each?

Answers

Answer:

If it is a matter of Operating system customization, he can do so with various software. Some of them are;

Antivirus Software - He should first get an antivirus software because going on the net without one is quite dangerous as he could inadvertently get a virus. There are free antivirus software on the net such as Avast but he should probably get a paid version as they offer more protection. Browsers - He will need a browser to get on the internet such as Chrome or Firefox. His laptop will have come with one but if he is not satisfied with that one, he can get others like the aforementioned ones. Office Suites - He should get an office suit to help him perform tasks such as text typing, spreadsheets, database management, PowerPoints and the like. The most famous office suit is Microsoft Office but there are others he can get to accomplish the same tasks. Media Players - His laptop will come with some media players but sometimes these can fall below expectations. He can get other ones such as VLC that will enable him to watch some media types that his default media software will be unable to play. Utility Tools - There are various tools he could download to help him use the laptop better such as graphics boosters, system cleaners, hard drive diagnostic tools and the like.

Tools he should use and their details are as follows,

Antivirus : Antivirus software is used to protect computers from viruses by scanning, detecting, and removing them.Office software : He should invest in an office suite to assist him with jobs like typing, making excel sheet, presentations, etc.Browser software : Browser is a computer software that displays and navigates across web pages using user interface. PDF readers : PDF readers is necessary to read and access PDF files.Media Players : Media player enables him to play media files on laptop operating system.Other tools : As per his requirements he can install other tools such as ERP softwares, CRM softwares, and many more.

These are some of tools he can use to customize his operating system.

Learn More : https://brainly.com/question/17320765

Select the invalid declaration from the lines of Java code below
int zebraCnt = 40000;
long birdCnt = 222_222_222_222_222L;
a. float avg = 23.5;
b. double avg = 98.32121;
c. None of the above. d. All are legal declaration.

Answers

Answer:

float avg = 23.5;

Explanation:

Given

The declarative statements

Required

Determine which of them is invalid

Analyzing them one after the other;

int zebraCnt = 40000;

This statement is valid as zebraCnt is correctly declared as type integer

long birdCnt = 222_222_222_222_222L;

This statement is valid as birdCnt is correctly declared as type long

float avg = 23.5;

This statement is invalid as avg is incorrectly declared as type float.

To correctly declare avg, you either change the datatype to double: as follows;

double avg = 23.5;

or append f to the declaration; as follows

float avg = 23.5f;

double avg = 98.32121;

This statement is valid as avg is correctly declared as type double

Hence, the incorrect declarative statement is float avg = 23.5;

the word biodegradable on a label doesn't necessarily mean a product is environmentally safe?

Answers

Answer:

Biodegradable means it SHOULD be safe for the environment. Meaning it can break down into natural elements. However, this is uncertain as some materials don't break down as easily, with a possibility of not having much of a difference as non-biodegradable materials. It all depends on the product, but if we're going by the label, then by definition it's environmentally safe.

Answer: True

Explanation: 100% correct

Describing Editing Task
Which tasks can a user accomplish by using the Find and Replace feature of Word? Check all that apply.
changing the size of the page
changing the case of a word
changing the spelling of a word
changing the margins of the page
changing a word to another word
3) Intro
Done

Answers

Answer:

changing the case of a word

changing the spelling of a word

changing a word to another word

Explanation:

fast we need help What is binary code? Why do computers use binary code?

Answers

Answer:

The digits: 0 and 1, are used by binary code to represent computer text or instructions and a bit string is assigned to each symbol or instruction. Computers use binary numbers because they have circuits that are either on or off, which gives them two states to work from to make calculations and run processes.

Hope this helped you!

Explanation:

To represent computer texts or instructions

Network convergence refers to using a single_______________.

Answers

Answer:

Network, vendor, and bill.

Explanation:

Network convergence is a term used in communication networking that describes the productive synergy among telephone, video, and data transmission using a single network, vendor, and a bill. It enables usage of numerous devices and numerous services with single network, vendor, and bill.

Hence, in this case, it can be concluded that, Network convergence refers to using a single network, single vendor, and single bill.

Other Questions
which is the most important role of the Nile River in the development of Egyptian civilization? A. the Nile was used for transportation B. The Nile protected Egypt from foreign intruders C. The Nile made the nearby lands fertile. 10x + 2=32 solve for x Rashad didnt want to join the army, and he wasnt doing well enough in school to attend college. List 2 alternatives for rashad to do after high school You may want to reference (Page) Section 12.4 while completing this problem. Enter the balanced chemical equation for the complete combustion of each of the following hydrocarbons found in gasoline used to start a fire:________. Part A. liquid nonane Express your answer as a chemical equation including phases. Part B. liquid isopentane (2-methylbutane) Express your answer as a chemical equation including phases. Part C. liquid 3-ethyltoluene Express your answer as a chemical equation including phases. (SAT Prep) In the given figure, C is the midpoint of AB and M is the midpoint of AC. Find the length of NB if MC = 4 and AN = 14. (A) 3 (B) 6 (C) 2 (D) 3.5 what questions do I need to ask a patient about hypertension? A note on william makepeace thackeray as a novelist. Why do cultures like India and the asu put such a value on things like rac and cow? In Abedis article banning plastic straws - a look at how much it actually helps, and who it could hurt , the author describes straws as a low-hanging fruit (paragraph 1). What overall impact does this phrase have on the authors purpose ? Where should transitions appear? A. between paragraphs and sentences B. wherever you need to connect ideas C. wherever your flow of ideas shift D. All of these are correct. Shelby purchases DVDs from a website. Each DVD costs $11, and the shipping and handling fees are $6.95. Shelby is charged a total of $50.95. How many DVDs did she purchase? Help me answer this, thank you What is the definition of control Read the excerpt and answer the question below. "Into this land of meek outcasts there came some Spaniards who immediately behaved like ravening wild beasts . . . killing, terrorizing, afflicting, torturing, and destroying the native peoples, doing all this with the strangest and most varied new methods of cruelty, never seen or heard of before, and to such a degree that this Island of Hispaniola once so populous (having a population that I estimated to be more than three million), has now a population of barely two hundred persons.-Source: Bartolom de Las Casas, Brief Account of the Devastation of the Indies, 1542. Which of the following historical figures most likely would agree with de Las Casass account of Spanish colonization? * A.Hernan Cortes B.Christopher Columbus C.Francisco Pizarro D.Moctezuma II Tara is 2 years older than Ryan. The sum of theirages is greater than 58. Describe Ryans age. Summary of accidental hero by zadie smith Express 25 to the power of 4x as a power of 5 in terms of x What is the solution to this linear system? Enter a value in each box to create an ordered pair. Jamestown settlement what was your reaction Chich expression correctly describes force using Sl unitsO A. 1 N = 1 kg-m/s2B. 1 N = 1 kg.m/sC. 1 J = 1 kg-m/s?D. 1 J = 1 kg m/s