What creative commons license allow for the work to be copied, distributed, displayed, or performed but modifications may not be made without the owner's consent

Answers

Answer 1

Answer:

No derivative works.

Explanation:

An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

A copyright can be defined as an exclusive legal right granted to the owner of a creative work (intellectual property) to perform, print, record, and publish his or her work. Also, the owner is granted the sole right to authorize any other person to use the creative work. For example, the copyright law which protects the sharing and downloading rights of music is known as the Digital Millennium Copyright Act (DMCA).

A creative commons license is simply a public copyright license that allows for the free distribution of a copyright protected material and it can only be used by the intellectual property owner.

Generally, there are four (4) main types of creative commons and these includes;

I. Attribution.

II. Share alike.

III. Non-Commercial.

IV. No Derivative Works.

No Derivative Works is a creative commons license which allow for a body of work (material) to be copied, distributed, displayed, or performed by another person but modifications may not be made without the owner's consent.


Related Questions

Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to give access
rights these employees. Which option will she use?
ОА.
remote desktop
ОВ.
monitoring service
Oc.
user accounts
OD.
print service
OE.
directory service

Answers

Answer:

C. user accounts

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.

In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.

Answer:

user accounts

Explanation:

necesito ejemplos de actitud filosófica por favor

Answers

Answer:

La filosofía es una disciplina intelectual que estudia críticamente las cuestiones más básicas de la humanidad y la naturaleza. Preguntas fundamentales de la filosofía son, entre otras, las siguientes:

-¿Existe alguna realidad fuera de mis pensamientos?

-¿Qué es el conocimiento?

-¿Qué es la verdad?

-¿Qué hace que una acción sea valiosa?

-¿Los humanos y los animales tienen valor y son iguales o diferentes?

-¿Qué es el tiempo?

Así, el planteamiento y reflexión de este tipo de preguntas son claros ejemplos de actitud filosfófica.

Which of these examples demonstrate portfolio income?

Answers

Answer:

Explanation:

is money that describe when a car house is sold

BRAINLIEST TO THE BEST ANSWER!!!!!!!!!!!!!
In your own words in at least two paragraphs, explain why it is important, when developing a website, to create a sitemap and wireframe. Explain which process seems most important to you and why you feel most drawn to that process.

Answers

Answer:A sitemap break a website down to it's most basic components and a wirefram gives more details of what each page will contain but if you do have fleshed out content ready bring that content into your wireframed to see how it fits

Explanation:

I need help getting earbuds please help

My mom wants reasons to get wireless earbuds and i'm out.

I need someone to give me some good things about wireless earbuds and bad things about wired earbuds.
(and i got in truble with bluetooth headphones)

Answers

Answer:

Wireless earbuds are a lot harder to break.

Explanation:

Normally if something goes wrong with wired earbuds/headphones it's due to the cord. Wired earbuds can break more easily and can possibly break off in the headphone jack (which is not fun to deal with, believe me. I had to deal with it a few weeks ago). Furthermore, wireless earbuds can't get tangled because they don't have a cord. Wired earbuds cords tend to get tangled and it's a pain to fix it every time it happens. Good luck getting your earbuds.

well im going to play devil's advocate here

reasons why you should not get wired earbuds they produce more greenhouse gas not just to make them but they take constant power and Bluetooth so this causes more greenhouse gas

you may think you need to replace them less but when you factor in the outright cost you still pay more

Hope this helped

-scav

1.The hardware that allows data to be transmitted from a computer along a telephone line to another computer at the other end is a_____

modem

keyboard

visual display unit

printer



Answers

So this is called a modem we use it to send  and receive info over telephone lines

Hope this helps

-scav

A free open source audio editing software program is
A. Sound Forge.
B. Pro Tools.
C. iTunes.
D. Audacity.

Answers

D. Audacity

،،،،، ،،،،،،،،،،

A free open source audio editing software program is Audacity. Thus, option D is correct.

What is audio editing?

The audio editing is given as the change in the audio, volume, with the length, speed of the audio or other manipulations. The audio editing is performed with the use of the software in the computer that enables the generation of the audio data.

The three types of audio editing techniques involves:

Sound Forge: It mediates the edit in the sound files with playback.

Audacity: It is a free software that has been used for long with multi-track audio editor and recorder.

Pro Tools: It enables the use of the view and edit of the track.

Therefore, A free open source audio editing software program is Audacity. Thus, option D is correct.

Learn more about audio editing, here:

brainly.com/question/24228690

#SPJ3

and, or, not are examples of boolean logic

Answers

true a example  boolean logic is (and, or, and  not)

-scav

Need answer ASAP. Thanks

Answers

Answer:

1. XHTML

2. XML

3. HTML

4. CSS

Explanation:

Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she always comes prepared, helps other students, does most of the talking, and handles all of the tasks. What does Nicole need to do to make the study group more effective? come better prepared and offer relevant information let other students participate more and share the workload share more of her opinions and answer questions keep her thoughts to herself and let others do all the talking

Answers

Answer:

B

Explanation

Let other students participate more and share the workload.

Have a good day everyone!

Answer:

let other students participate more and share the workload

Explanation:

What technology standard is commonly used today for hard drives to interface with the motherboard in a system? pasago po salamat ^_^

Answers

Answer:

Serial Advanced Technology Attachment (SATA).

Explanation:

The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Thus, the hardware components of a computer are the physical parts that can be seen and touched. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.

Digital storage of data refers to the process which typically involves saving computer files or documents on magnetic storage devices usually having flash memory. Some examples of digital storage devices are hard drives, memory stick or cards, optical discs, cloud storage, etc. A reliable storage such as a hard-disk drive ensures that computer files or documents are easily accessible and could be retrieved in the event of a loss.

Serial ATA (SATA) is a technological standard which is commonly used today for hard drives to interface with the motherboard in a computer system. Thus, it's simply a bus interface on computer systems that is typically used for connecting mass storage devices to host bus adapters such as motherboards.

Generally, SATA comprises of two ports and these are the power and data connector.

5.What type of mic would you use for the following scenario:
• You want to pick up a wide range of frequencies , You are looking for an extraordinarily rich representation of the original sound, You seek smooth, detailed sound, You want to capture the subtle nuances in a recording studio, You expect and appreciate subtle, sensitive sound

a. Ribbon
b. Condenser
c. Dynamic

Answers

Answer: ribbon

Explanation:

Ribbon microphones are regarded as the most natural mics which can be used in capturing the voice, the sound of an instrument, and also the ambience of a room.

Ribbon microphone gives an extraordinarily rich representation of the original sound and also provide a smooth, and detailed sound.

what is the output of this line of code
print("hello" + "goodbye")
A - "hello" + "goodbye"
B- hello + goodbye
C - hello goodbye
D - hellogoodbye

Answers

Answer:

D - hellogoodbye

Explanation:

since your merging two string together you will simply just get one string in total

Answer:

D

Explanation:

How to create a trace table

Answers

Answer:

To create table g

Go to insert tab

Choose Table option at left corner and measure the table box.

Table is created in Microsoft.

Need the answer ASAP. Thanks

Answers

Answer:

join

Explanation:

It’s

Join.

That’s the correct word.

Hey, Another question. I'm sure it's possible in the future, but I wanted to ask if HIE would be possible. I'm sure it would be, I just want to hear other people's comments on this. (Beatless)

Answers

Answer:

Originally Answered: Will there ever be a band as big as the Beatles? No, there will never be a band as popular as the Beatles. For one thing they were exceptionally good in a time of great music in general.

Explanation:

please mark this answer as brainliest

Which option best describes what spotting sessions are in the context of filmmaking? ASAP PLEASEEEEE!!!!!!! 40 points
A.
They are sessions dedicated to discussing the film's art direction.
B.
They are sessions dedicated to discussing the film's screenplay.
C.
They are sessions dedicated to discussing the film's cinematography.
D.
They are sessions dedicated to discussing the film's costume design.
E.
They are sessions dedicated to discussing the film's score.

Answers

The answer you are looking for is E! :)

Answer:

E.  They are sessions dedicated to discussing the film's score.

Explanation:

PLATO

What is a commerce platform?

Answers

Answer:

In basic terms, a commerce platform simply refers to technology that enables a transaction (the commerce bit). The platform part allows you to overlay that technology across various channels such as online and in-store.

Answer:

Explanation:

a commerce platform simply refers to technology that enables a transaction (the commerce bit). The platform part allows you to overlay that technology across various channels such as online and in-store.20 Feb 2017

Computer simulations were first developed during __________
as a part of the _____________

Answers

Answer:

WWII; Manhattan Project.

Explanation:

Computer simulation refers to a mathematical model designed and developed to predict the outcome or behavior of a hypothetical or real-life scenario on a computer system, so as to illustrate and understand how the system functions.

Historically, computer simulations were first developed during World War II (WWII) as a part of the Manhattan Project.

For example, SimpleScalar refers to a computer architectural simulating software application or program which was designed and developed by Todd Austin at the University of Wisconsin, Madison, United States of America. It is an open source simulator written with "C" programming language and it's used typically for modelling virtual computer systems having a central processing unit (CPU), memory system parameters (hierarchy), and cache.

In the Computer, simulations were first developed during the Manhattan Project

as a part of World War II to model the process of a nuclear detonation.

Thus Computer was a simulation of 12 hard spheres which were using a Monte Carlo algorithm. Also, When Computer simulation is often used as an adjunct to, or which substitute is for a modeling system for which is simple and closed-form analytic solutions are not possible. There are many types of computer simulations are The common feature is the attempt are to generate a sample of the representative scenarios for a model in which a complete enumeration of all are possible states of the model would be prohibitive or that are impossible.

Learn more about:  

https://brainly.com/question/15182181

Which security option should be used to ensure the integrity and validity of an Access database?

digital signature
database password
trust center options
start-up options

Answers

Answer:

The best security which could be used to ensure integrity and validity of Access database is:  

O. database password

Explanation:

Database password is the only option that best guarantee the integrity of an Access database due to the fact that, it limits the number of people who would be able to have access to it. This password is an administrative right given to those who are meant to access it and it is expected to be renewed every few months (probably every 3 months).

Without the password, no other person can be able to login. Also, no two individual can be able to login in same time using same credential login details assigned (that is, in scenario of using the same Username and password)

Answer:

A) digital signature

Explanation:

2. You go to an intemet cafe to send an email to your friend upon returning home you
realize that you forgot to log out your account. What probably could happen to your
account?​

Answers

There is a risk that someone else would gain access to your account as well as your personal information.

Pueden cojer los datos privados hackear la cuenta

What does a touch ring allow an artist to do on an a digital tablet

Answers

good question i need more

N an AWS design template, the "depends on" property of a resource is represented by an _________ color dot. Red Orchid Blue Black

Answers

Answer:

Black

Explanation:

Explicit dependencies in Amazon Web Services are used to determine the order in which resources are added or deleted on AWS Cloud Formation. If a user wishes to create explicit dependency, a line from the "dependson" dot located at the route is moved to the gateway-VPC attachment.

The "dependson" dot helps to specify which resource is created before another. It is signified by a black dot (*). It can be used to override parallelisms and also to determine when a wait condition becomes activated.

(Java)
Summarize the connection between controls, events, and subroutines.

Answers

In order to create an effective summary, you must take time to read through the topics that you have been given. Namely:

"The Connection between Controls, event, and subroutines".

What is a Summary?

A summary refers to a concise statement or account or report of the key points of an event, story, or literature.

A summary is usually exclusive of details that are not necessary. It focuses on the key points.

The text relating to the topic must be carefully researched. Jot down your points on a separate sheet, especially when looking at introductory paragraphs and chapters. You will also find key points in the conclusive paragraphs of each chapter or the text.

Then ensure that all your points are arranged in an order that is logical and sequential.

Learn more about Summaries at:

brainly.com/question/25605883

HELP I HAVE A D RN PLEASE
Use the drop-down menus to describe how to encrypt a database with a password.

1. In Access, click Open on the File tab.

2. Select the database.

3. Click the drop-down arrow to the right of Open, and click
.

4. Click the File tab.

5. Click
, and select Encrypt with Password.

6. Enter a password when you are prompted
. Click OK.

7. Close and reopen the database.

8. To open the database again, you will need to
.

Answers

Answer:

1. Open Exclusive

2. Info

3. twice

4. enter a password

Explanation:

In Access, click Open on the File tab. Open Exclusive or backstage View. Select the database by. clicking Info and Click the File tab twice and enter a password

Which view is opened when File tab is clicked?

The Backstage View is said to be opened. Note that one can use the Backstage through the clicking of the "File" tab that can be found on the top-left hand side of the system application window.

Note that In Access, click Open on the File tab. Open Exclusive or backstage View. Select the database by. clicking Info and Click the File tab twice and enter a password.

Learn more about password from

https://brainly.com/question/17174600

#SPJ2

Which of the following best describes the protocols used on the Internet?

The protocols of the Internet are designed by government agencies to ensure they remain free to use

The protocols of the Internet are secret to maintain the privacy and security of people using them

Each device connected to the Internet will use a protocol designed by the company that manufactured it

The protocols of the Internet are open and used by all devices connected to the network

Answers

The protocols of the Internet are open and used by all devices connected to the network

-scav

Which service uses a broadband connection?
Select one:
O a. DSL
O b. 3G and 4G
O c. dial up
O d. all connections use broadband

Answers

Answer:

d

Explanation:

because all in one question form

1. What are you going to do if someone ask for your personal information online?​

Answers

Answer:

Ask them why they need such information.

Explanation:

If they can't give you a good reason, please don't share your personal info. ♥

Answer:

If someone ask my personal information online i'll  trun off  my mobile data or wi-fi  and then i'll block the user's Id

Explanation:

hope it is helpful to you

Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she always comes prepared, helps other students, does most of the talking, and handles all of the tasks.

What does Nicole need to do to make the study group more effective?

come better prepared and offer relevant information
let other students participate more and share the workload
share more of her opinions and answer questions
keep her thoughts to herself and let others do all the talking

Answers

Answer:

let other students participate more and share the workload

Explanation:

Answer:

The person above me is right, give them brainliest please

Explanation:

Got it right on Edge, have a good day~

The photograph shows a way individuals work together in groups a the photograph​

Answers

Answer:

D. Administrators

Explanation:

Hope it helps

#CarryOnLearning

Other Questions
Select all that apply for the North..-Industries -Small population -Shipping ports-Slave labor Fully simplify the fraction in the photo. No links. Help I got a little confuse here! Which is not a solution of this inequality? point a and point b are placed on a number line point a is located at -20 and point b is 5 less then point a Wich statement about point b is true If each serving of the stew will contain 1 4 14 pound of meat, how many servings of the stew can the club make? Enter your answer in the box. which sentence uses a semicolon correctly? a) out of thirty students; only eight students got Asb) the entire class of thirty students; studied hard for the test c) the thirty students studied for the test; without any problems d) the thirty students studied for the test; only eight students got As Stevens rectangle measures 3 1/2 units by 2 1/3 units what is the area? Topic E: Expressing Operations in Algebraic Form I NEED THE ANSWER AS SOON AS POSSIBLE Which technique combines two-dimensional Images Into a three-dimensional Image?The _______________technique combines two-dimensional images and enhances them to create a three-dimensional image. This technique is used by forensic scientists to recreate crime scenes and evidence. ibigay ang mga katangian ng Raihan Sa akda Consider the following vectors in component form.u=3.2,2.5v=6.3,5.9w=0.2,0.9z=11,3Represent each of the following resultant vectors in component form. (Each answer should be in the form "< #, #>".) u+v= v+w= u+z= w+z+u= Dominique has a movie collection. The types of movies in Dominique's collection are shown inthe circle graph.Dominique's Movie CollectionMysteries30%comedieComedies25%Biographies + 10%Dramas15%Cartoons20%Dominique has 260 movies in her collection. How many more cartoons, biographies, andcomedies than all other types of movies does Dominique have in her collection? David drew this diagram of a picture frame he is going to make. Each square represents 1 square inch. What is the area of the picture frame? Read the excerpt from "To Save a Turtle."Early every morning, all of the volunteers at the sea turtle camp went out to the beach.This detail of the story tells the readera)what the conflict is.b)who the main character is.c)where the story takes place.d)how the conflict is solved. Identify the type of reactions based on the reactants. Then, predict the products for the following reactions. Make sure to balance the reactions.a. C3H8 + O2 b. HBr + KOH c. KCl + AlBr3 Explain what an abolitionist is or what the abolitionist movement was about in your own words What is the answer to this question? A photographer is arranging 3 puppies in a row for a photo. There is one black puppy (B), one tan puppy (T), and one white puppy (W). Which list shows all the possible arrangements of the puppies? Select one:BTW, BBB, TTT, WWW, BBT, BBW, TTB, TTW, WWB, WWTTWB, BTW, WBTTWB, TBW, BTW, BWT, WBT, WTBBTW, BWT A snow cone cup is 12 cm tall and has a diameter of 8 cm. Find the volume of flavored ice that can be held inside the snow cone cup.