Case-Based Critical Thinking QuestionsCase 3-1Professor Smith is offering a tutorial on copyright to her freshman writing class and she is preparing a primer for them with some challenging questions. Which of the following is NOT a true statement that she can make about a work created on January 15, 1914?
A. The work may or may not be in the public domain.
B. The work can be reproduced without permission.
C. The work can be reproduced without charge.
D. The work does not need to be verified through the Copyright Office.
Answer: A
You might also like to view...
Match each item with a statement below.
A. The GNOME file manager. B. Scans for and filters junk mail. C. A software container with its own OS, IP address, and applications. D. Used to digitally sign and encrypt e-mails. E. An archive file containing the contents of a CD or DVD. F. The e-mail software included with GNOME. G. The password encryption used in openSUSE. H. The default KDE file manager. I. A virtual screen on the Linux desktop.
If you want to allow a non-visual user agent to understand the purpose of a table, you should use the ____________________ element.
Fill in the blank(s) with the appropriate word(s).
Which of the following is the term for known specific patterns of viruses?
A. virtual viruses B. virus traces C. virus signatures D. virus items
________ attempts to trick Internet users into thinking a fake but official-looking website or email is legitimate.
A. Phishing B. A first-party cookie C. A Trojan horse D. A third-party cookie