One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples.
?
Which of the following is NOT permissible under a single-user license agreement?
a. Jamie installs Quark Xpress on a single computer.b. Christine leases her copy of Dreamweaver.c. Phuong-Dao makes one copy of Microsoft Office 2013 as a backup.d. Isaiah sells his copy of Adobe Photoshop CS6, having removed it from his computer first.
What will be an ideal response?
Answer: B
You might also like to view...
Answer the following statements true (T) or false (F)
1. A circuit level proxy can be a stand alone system or it can be a specialized function performed by an application level gateway for certain applications. ??? 2. An example of application level gateway implementation is the SOCKS package. ? ? 3. Firewall functionality can also be implemented as a software module in a router or LAN switch. ? ? 4. The primary role of the personal firewall is to deny unauthorized remote access to the computer. ?? 5. ?The external firewall adds more stringent filtering capability in order to protect enterprise servers and workstations from external attack. ?
A page that is __________ is a good candidate for page migration.
a) frequently read by several remote nodes, but not modified b) frequently modified by several remote nodes c) frequently modified by a single remote node d) frequently read and modified by several remote nodes
?List the procedure to insert Access data in a PowerPoint slide.
What will be an ideal response?
DHCP delivers the necessary configuration information to clients to tell them the addresses of their IP gateways.
Answer the following statement true (T) or false (F)