Which of the following is an example of a derivate work for a novel available as an e-book?
a. a parody novel written by another author
b. statistics of book sales for the novel and other similar novels
c. a poster of the novel cover
d. all of the above
c
You might also like to view...
A chain of custody establishes?
A. ?that a piece of evidence is authentic. B. ?who owned an item at the time of the accident. C. ?which side gets to present a piece of evidence at trial. D. ?who takes custody of the item after trial.
Students waiting to hear if prestigious business schools have accepted them into next year's class come across instructions on an online bulletin board posted by an anonymous hacker. The hacker posts simple directions for students to gain access to the business school's acceptance letters. By typing in a web address, www.businessschoolisus.edu/admissions/acceptance/johndoe.cfm, students can
access their own letters only. (That is, the hacker tells them to replace johndoe with their own names to get into their own files.) Several students use the instructions and see their acceptance or rejection letters before they are mailed out and official. What crime, if any, have they committed? What will be an ideal response?
The right to a public and speedy trial is promised in which Constitutional Amendment?
A) Fourth B) Fifth C) Sixth D) Seventh E) Eighth
Describe the different canons of statutory construction
What will be an ideal response?