Illegally using copyrighted software is known as software ________.

What will be an ideal response?


piracy, copyright infringement

Computer Science & Information Technology

You might also like to view...

IP and IPX are examples of protocols that operate in what layer of the OSI model?

What will be an ideal response?

Computer Science & Information Technology

The dialog box in the accompanying figure is streamlined in Access 2010 so it's easier to use and now includes Help tools that guide you to enter expressions quickly and accurately.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To ____ text means to highlight a block of text.

A. select B. choose C. find D. open

Computer Science & Information Technology

What connects a personal computer to a cable-TV system that offers an Internet connection?

A. T1 line B. cable modem C. DSL line D. communications satellite

Computer Science & Information Technology