_____ refers to the use of any of several technologies to enforce policies for controlling access to digital media, such as movies, music, and software.

a. Copyright protection
b. Software protection dongle
c. Software piracy
d. Digital rights management


Answer: d. Digital rights management

Computer Science & Information Technology

You might also like to view...

Write a function to change the frequency of a sound 10 times—five times lower than the original frequency, and five times higher.

Note: The function does not specify the amount to change the frequency by, therefore shifting it by any amount between one and zero five times then any amount greater than one five times will work. The easiest way to do this is to make use of the “halve” and “double” functions from this chapter. However, this will be very slow.

Computer Science & Information Technology

Examples of personal computers include all of the following EXCEPT ________

A) gaming systems B) mobile devices C) notebooks D) desktops

Computer Science & Information Technology

This file type uses commas to separate data into columns

A) pdf B) csv C) tab-delimited D) jpeg

Computer Science & Information Technology

If you enter Expression Web Dynamic Web Templates into your favorite search engine, you will find dozens of sites that offer templates for sale. Usually the templates are categorized by ____.

A. the type of Web site or business for which they would be suitable B. alphabetically C. chronologically D. design layout

Computer Science & Information Technology