You do not need to cite anything used from creative commons.
True or False?

Answers

Answer 1

True. It is not necessary to cite information that is common knowledge. One of the ways to judge if something is common knowledge is to ask yourself if anyone in the field would know this information or if no one would argue against it.

Answer 2

Answer: False

Explanation: Creative commons is when a person uploads their own copyrighted content and gets license for it, so it other people online may add to it or alter it and re-share it. They get to decide how you get to use and what you are allowed to do with but no matter the situation you always have to give credit to the original content creator. Thus, false, you NEED to cite anything used from Creative Commons.


Related Questions

Taking on a programming internship does not provide training and is of little value to an intern. True or False.

Answers

Answer:

the correct answer is False

Carlos is having trouble with his device. It keeps freezing on him and he does not know what to do. What is the first step he should take when troubleshooting this problem?

A.
sell the computer

B.
check for power issues

C.
restart his device

D.
verify network connectivity

Answers

c restart his device

Explanation:

it is freezing and the most logical reason is c restart his device

SOMEONE PLEASEE *URGENT**

Sequencing and Flowcharting
Try writing out the sequence of events for one of the simple instructive processes below:

1. Drawing a square on a piece of 8 x 11 paper.
2. Moving from your 2nd-period class to your 3rd-period class.
3. Adding a new contact to your list of cell phone contacts.

Now, create a flowchart that outlines how to complete your chosen sequence of events. You may wish to reference these common flowchart symbols as you work.

Submit
1) In the text box: Your sequence of events written out.

2) A file image of your flowchart outlining that sequence of events.

Answers

hope this helps!!!!!

What does the office background allow you to do?

Answers

Answer: Any changes that you make to the Office Background in PowerPoint 365 will be reflected in all other Microsoft Office 365 products on your computer, such as Word, Excel, Outlook, and others. These patterned strips are not activated by default.

HELP PLEASE
Which type of error occurred in the following lines of code?

>>> print(9 / 0)
Traceback (most recent call last):
File " ", line 1, in
9/0
ZeroDivisionError: division by zero

logical error
logical error

exception
exception

syntax error
syntax error

reserved word error
reserved word error

Answers

Answer:

Logical Error

Explanation:

The division by 0 is a logical error.

Advantages and Disadvantages of Modern Devices​

Answers

Answer:

Advantages of Technology:

Easy access to information

Improved Communication

The convenience of travelling

Convenience in Education

Improved entertainment

Disadvantages of technology

Excessive dependency

Inevitable Cheating

Laziness and forgetting the basic way of studying

Rank the following storage systems from slowest to fastest:
a. Hard-disk drives
b. Registers
c. Optical disk
d. Main memory
e. Nonvolatile memory
f. Magnetic tapes
g. Cache

Answers

Answer:

Slower = Larger capacity (and vice versa)

Ranked from Slowest to Fastest:

1. magnetic tapes

2. optical disk

3. hard-disk drives

4. nonvolatile memory

5. main memory

6. cache

7. registers

Raw images can be processed again at a later date when new and improved software become available.
Group of answer choices

True

False

Answers

Answer:

True

Explanation:

You join Mountain Water Co – an expanding bottled water company as an information security officer. The company wants to do a lot of advertising of its bottled water products through its website. The CEO asks you to review the company website and report if it is secure. After talking to the webmaster you find out the following:


The Web server accepts all connections


No authentication is required

Self-registration is allowed

The web server is connected to the Internet

Is the situation secure? Select all that apply.


a.

Yes. There is no threat to a bottled water company so it is secure.


b.

There is insufficient information available to answer this question.


c.

No. Anything that is connected to the Internet is insecure.


d.

No. The system is allowing everyone to register. Only individuals who are associated with the company should be able to register.


e.

No. If there is no authentication, then anyone with access to the website online can access it. For good security only individuals with certain authorized roles should access a website.

Answers

In regards to the above case, My response is c. No. Anything that is connected to the Internet is insecure.

What is meant by computer security?

Computer security is known to be a term that can be called cybersecurity. This is seen as a form of  protection of computer systems as well as information from any kind of harm, theft, as well as any form of unauthorized use.

Note that Computer hardware is seen to be protected by the same ways or methods that one uses to protect other valuable things.

In the above, there is no method of authentication and as such, In regards to the above case, My response is c. No. Anything that is connected to the Internet is insecure.

Learn more about Computer security from

https://brainly.com/question/25720881

#SPJ1

The student's quiz grades are stored in the Python list quizzes. To calculate the student's quiz average we need to drop the 3 lowest scores and calculate the average of the remaining quizzes. The output is to be the average of the remaining quiz grades and the quiz grades that were dropped. Make use of the string formatting in section 3.7 to create the output.

Answers

The program that will compute the average quiz grade for 5 students is given below:

The Program

# This program will compute the average quiz grade for 5 students

print("Hello, this program is designed to compute the average quiz grades for the following students: Clark, Nicole, Kiran, Alex, and Erik")

students = ["Clark", "Nicole", "Kiran", "Alex", "Erik"]

grades = []  # create an empty list to store the grades in

for student in students:

   print(student, ", What was your quiz grade?")

   grade = input("My grade is: ")

   grades.append(int(grade))  # convert the grade to an integer number, then add it to the list

print("Here are the grades you entered: ", grades)

average = sum(grades) / len(grades)

print("The average is:", average)

highest = max(grades)

print("The highest grade is:", highest)

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

How many input configurations does the Boolean expression (x AND Y) OR (NOT x
AND NOT y) have?
4
6
8
10
CAN SOMEONE PLSEASEEE HELP ME

Answers

Answer:

4

Explanation:

There are only 2 inputs, X and Y, and the number of different input configurations will be 2-to-the-power-of the number of inputs.

2² = 4

In other words, XY can be 00,01,10 or 11 and that's it. Four combinations.

BTW, (x AND Y) OR (NOT x AND NOT y) is allso called XNOR. See picture.

Write code to print values of integers x, y, and z in a single line such that each value is left-justified in 6 columns

Answers

The code to print given value can be x = int(input ("enter first number: ")) y = int(input ("enter second number: ")) z = int(input ("enter third number: ")) print('%6d %6d %6d' %(x,y,z)).

What is a code?

Print is a function in many programming languages that sends text, variables, or another object to the screen. If you're more familiar with the Scratch programming language, print is equivalent to say.

The print command is used to print a file without using a printing-capable Windows application.

We receive three integer variables (x,y,z) using the Python programming language, and the values are printed out using string formatting (%6), which specifies that the output should be right justified with a width of 6.

x = int(input ("enter first number: "))

y = int(input ("enter second number: "))

z = int(input ("enter third number: "))

print('%6d%6d%6d'%(x,y,z)).

Thus, this is the code to print given value.

For more details regarding a code, visit:

https://brainly.com/question/1603398

#SPJ1

list any three specification technology​

Answers

Answer:

descriptive, performance and detailed.

Which of the following information
is required by application programs
to access the content ofa file.
a. File name
b. File location
c. File extension
d. File size

Answers

An information which is required by application programs to access the content of a file is: c. File extension.

What is a file?

A file can be defined as a computer resource or type of document that avails an end user the ability to save or record data as a single unit on a computer storage device.

In Computer technology, a sequence which best reflects the size of various files and their extension on a computer system, from smallest to largest include the following:

Text (.txt)Compressed files (.zip)Picture (.jpeg)Audio (.mp3)Video (.mp4)

In conclusion, we can reasonably infer and logically deduce that an information which is required by application programs to access the content of a file is file extension because an error would occur if there's an incompatibility issue between the two resource.

Read more on file extensions here: brainly.com/question/1982059

#SPJ1

write a complete main that will input a decimal number, double it and display the results

Answers

Answer:

No sure what language you want but since I am best with Java.

class Main {

 public static void main(String[] args) {

   Scanner input = new Scanner(System.in);  // Create a Scanner object

   System.out.println("Enter Number");

double number01 = input.nextLine();  // Read user input

double multi = number01 * 2;

   System.out.println("Number is " + multi);  // Output user input

}

}

Explanation:

Bad Directions You are driving to your friend’s house and are using your smartphone for directions. While approaching your destination, you realize that your smartphone app instructed you to turn the wrong way on your friend’s street. How could this have happened?

Answers

This could have happened when:

Lack of Internet service or failureWrong application.What do you mean by Internet?

The Internet is seen as a form of a network that helps people to  connects their computers all over the nation.

In this age,  Through the help of the Internet, people are able to  share information and navigate through places.

Note that the problem of bad direction could have happened when:

Lack of Internet service or failureWrong application.

Learn more about Internet from

https://brainly.com/question/2780939

#SPJ1

A computer is experiencing network connectivity issues; what step would you NOT attempt to solve the problem?

Answers

Answer:

A step I wouldn't take is throwing the computer in the trash and lighting my house on fire.

Explanation:

You want to see data on charters flown by either Robert Williams (employee number 105) or Elizabeth Travis (employee number 109) as pilot or copilot, but not charters flown by both of them. Create the table that would result from applying the SELECT and PROJECT relational operators to the CHARTER table to return only the CHAR_TRIP, CHAR_PILOT, and CHAR_COPILOT attributes for charters flown by either employee 105 or employee 109.

Answers

Answer:

So, what is the question?!

Explanation:

The Internet is the largest example of a _____?

Answers

Answer:

the answer is wide area network

Which of the following commands will visualise the running processes?

Select one:
a. Get-Process
b. Get-RunningProcesses
c. Show-Process

Answers

Answer:

A

Explanation:

The PS command displays your currently running processes in real-time. This will display the process for the current shell with four columns: PID returns the unique process ID.

A

It shows your current running instant in real-time

Which of the following makes the varied types of digital communication possible?


an agreed-upon set of rules and standards governing the way technology shares and manages data


properly linking all of the workstations on a closed loop-like configuration


refraining from relying too heavily on one central hub that connects all nodes on a system


only using a high-quality server computer with lots of memory

Answers

Answer:

An agreed-upon set of rules and standards governing the way technology shares and manages data

Your team has been assigned responsibility to identify an appropriate MSSP provider for a small, rural hospital. What criteria will you use to select an appropriate provider? Do research online to identify three MSSP providers. Use the criteria you established to rate each of the three, and choose the one that would be best for the hospital.

Answers

The Criteria for Choosing the Right MSSP for for a small, rural hospital are:

Customized solution. UX – User experience. Responsiveness. Cost-effective.

What are the three MSSP providers?

They are:

1) Cipher.

2) SecurityHQ.

3) SecureWorks.

The option that is chosen among the three is Cipher. It is known to be chosen because they provide the services listed above which is needed by the hospital as well as:

Cybersecurity MonitoringIncident Management and Cyber Defense Security Asset Management, etc.

Therefore, based on the above. The Criteria for Choosing the Right MSSP for for a small, rural hospital are:

Customized solution. UX – User experience. Responsiveness. Cost-effective.

Learn more about Cipher from

https://brainly.com/question/14754515
#SPJ1

I want to know if C# can be used to solve questions here as well.

Answers

What exactly is the question that you’re asking what is C #?

why information systems were centralized and used solely with governance and management
during the First Era

Answers

The data will be given according to the supply and the processor was strong with governance and management

What is information systems?

Storage of data sets, interaction logs, documents, and modification histories can be done with the help of computer systems. The organization will spend a considerable amount of time hunting for certain data if the conventional remote backup is used.

Strategic planning is a governance strategy used by governments. The act of submitting, succumbing, or providing details is known as data compliance was used in the First Era.

Learn more about information systems, here:

https://brainly.com/question/13299592

#SPJ1

1. What is the difference between tools and equipment?

2. Describe the word paraphernalia.​

Answers

Answer:

down below

Explanation:

1- tools can be any item used to achieve a goal. an equipment is a specific tool used to achieve a specific object

2- it means article of equipment. equipment used for a particular activity.

hope this helps<3

Tools are used to fix things or help fix things and equipment is like for example I need equipment for my in home gym

Which of the following is NOT an e-reader you would use as an alternative to carrying around a set of textbooks?

Answers

Answer:

Which of the following is NOT a benefit of a word processing application?

Explanation:

what is paragraph indentation

Answers

Answer:

a blank space between a margin and the beginning of a line of text

Explanation:

The space before start start of your paragraph. Ex:what I did with the first sentence

Name this program lower.c - This program will read two strings and output which string has more lowercase letters. If both strings contain the same amount of lowercase letters, indicate the number of lowercase letters. Match the output according to the examples below. Assume each string will contain less than 50 characters.

Examples
Enter two strings:
Hello wORLD
'Hello' contains 3 more lowercase letter(s) than 'wORLD'.

Enter two strings:
HELLO WORLD
'HELLO' and 'WORLD' both contain 0 lowercase letter(s).

Enter two strings:
CRIMson! tide1
'tide1' contains 1 more lowercase letter(s) than 'CRIMson!'.

Answers

The program will be:

#include <stdio.h>

int lower_count(char s[]) {

   int count = 0, i;

   for (i = 0; s[i]; i++) {

       if (s[i] >= 'a' && s[i] <= 'z')

           ++count;

   }

   return count;

}

int main() {

   char str1[51], str2[51];

   int count1, count2;

   printf("Enter two strings:\n");

   scanf("%s", str1);

   scanf("%s", str2);

   count1 = lower_count(str1);

   count2 = lower_count(str2);

   if (count1 > count2) {

       printf("'%s' contains %d more lowercase letter(s) than '%s'.\n", str1, count1 - count2, str2);

   } else if (count1 < count2) {

       printf("'%s' contains %d more lowercase letter(s) than '%s'.\n", str2, count2 - count1, str1);

   } else {

       printf("'%s' and '%s' both contain %d lowercase letter(s).\n", str1, str2, count1);

   }

   return 0;

}

What is a program?

It should be noted that a series of instructions written in a programming language for a computer to follow is referred to as a computer program.

The software, which also contains documentation and other intangible components, comprises computer programs as one of its components. Source code is a computer program's human-readable form.

In this case, the program is shown above.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

How is the Agile way of working different?

Answers

Answer:

It is working within guidelines (of the task) but without boundaries (of how you achieve it).

Do some research and find out whether Babbage’s Analytical Engine is a computer according to the von Neumann model.

Answers

Answer: The Analytical Engine incorporated an arithmetic logic unit, control flow in the form of conditional branching and loops, and integrated memory, making it the first design for a general-purpose computer that could be described in modern terms as Turing-complete.

Other Questions
What characteristics of family functioning during the colonial, slavery, and/or industrialization still occur today? How is todays family different from the families of the past? following paragraph and answer the question: Beth lay in bed unable to fall asleep. Her eyes darted around the dark room. The wind roared causing the tree branch her window with an ear piercing scream. Suddenly she heard something coming up the steps. Thump, thump, thump, it was getting closer. She tightly squeezed her t as the door slowly creaked open." What is the mood of this paragraph?A. Scary B. HappyC. DepressingD. Silly This bread I used to bestow upon the hungry little urchins, who, in return, would give me that more valuable bread of knowledge. I am strongly tempted to give the names of two or three of those little boys, as a testimonial of the gratitude and affection I bear them; but prudence forbids; not that it would injure me, but it might embarrass them; for it is almost an unpardonable offence to teach slaves to read in this Christian country.Narrative of the Life of Frederick Douglass,Frederick DouglassWhat can you infer about the street children based on the passage?a-The children could be looked down upon as adults for helping Douglass.b-The children will stop helping others learn to read as a result.c-The children will be embarrassed by teaching Douglass. Felicia decided to invest $17,000 of her retirement fund explain the implications of globalization. identify at least two ethical issues that go along with the global societal topic you have chosen for your final essay. explain how globalization contributes to or affects these ethical dilemmas. propose solutions to these ethical dilemmas that are feasible financially, socially, and culturally. Help I will AWard Brainlist !!! its Math problem Please Help find the length of b. thank you means alot. What is the coordination number for atoms that pack within the diamond cubic crystal structure?. 1,2,3 please do 10 points A nonconducting ring of radius 10.0 cm is uniformly charged with a total positive charge 10.0C. The ring rotates at a constant angular speed 20.0 rad/ s about an axis through its center, perpendicular to the plane of the ring. What is the magnitude of the magnetic field on the axis of the ring 5.00 cm from its center? Read the section from Chapter 8 of Don Quixote by Miguel de Cervantes. They returned to the road they had set out with, leading to Puerto Lapice, and at three in the afternoon they came in sight of it. "Here, brother Sancho Panza," said Don Quixote when he saw it, "we may plunge our hands up to the elbows in what they call adventures; but observe, even shouldst thou see me in the greatest danger in the world, thou must not put a hand to thy sword in my defence, unless indeed thou perceivest that those who assail me are rabble or base folk; for in that case thou mayest very properly aid me; but if they be knights it is on no account permitted or allowed thee by the laws of knighthood to help me until thou hast been dubbed a knight." "Most certainly, seor," replied Sancho, "your worship shall be fully obeyed in this matter; all the more as of myself I am peaceful and no friend to mixing in strife and quarrels: it is true that as regards the defence of my own person I shall not give much heed to those laws, for laws human and divine allow each one to defend himself against any assailant whatever." "That I grant," said Don Quixote, "but in this matter of aiding me against knights thou must put a restraint upon thy natural impetuosity." "I will do so, I promise you," answered Sancho, "and will keep this precept as carefully as Sunday." How does the author convey that Sancho will obey Don Quixote above any laws? Direct characterization & dialogue Direct characterization & internal thoughts Indirect characterization & dialogue Indirect characterization & internal thoughts quizlet what aspect of the control environment is affected by the company's decision to hire temporary workers? jaynet spends $30,000 per year on painting supplies and storage space. she recently received two job offers from a famous marketing firm one offer was for $110,000 per year, and the other was for $80,000. however, she turned both jobs down to continue a painting career. if jaynet sells 25 paintings per year at a price of $8,000 each: Which one is the answer?? Help lol a realistic and cost-effective starting point for emergency services in low-income countries could be: a. major expansion of emergency rooms in hospitals b. emergency transport c. training more trauma surgeons d. creating more level i hospitals Simplify negative three fifths times m times quantity negative two sevenths times m minus one fourth end quantity.A: 6 over 35 times m squared plus 3 over 20 times mB: negative 6 over 35 times m squared minus 3 over 20 times mC: 6 over 35 times m squared plus one fourthD: negative 6 over 35 times m squared plus 3 over 20 times m I don't really understand this, how to set it up etc and i cant figure out how to get the actual answer. Im sorry i make no sense The passage below can be revised to make it more concise. Which word is a modifier that can be eliminated because it adds no meaning?Dr. Madison is somewhat skeptical about stories of global warming. She has gathered scientific data in remote areas to prove her position. Somewhat Global Scientific Remote what is the number of shells and number of valence electrons for the following elements: Na, O, I, Ca A bicyclist traveling at 5 m/s hits a fence, the bicyclist files over the fence. Whichof Newton's Laws does this BEST describe?1.Newtons 1st Law2.Newton's 2nd Law3.Newton's 3rd Law Partial income statements of Schneider Products Inc. are reproduced below: 2019 $50,000 20,000 $30,000 2020 $50,000 23,000 $27,000 Sales Cost of goods sold Gross profit The 2019 ending inventory was overstated by $2,000 during the physical count. The 2020 physical inventory count was done properly. Required: 1. Calculate the impact of this error on the gross profit calculated for 2019 and 2020. 2. What is the impact of this error on total assets at the end of 2019 and 2020? Net assets?