Match the source to contact with the associated media when requesting permission to use work.

A. still images and art
B. music and audio
C. print and Web text


A. Gallery, museum, creator
B. Composer, songwriter, lyricist, record label
C. Publisher, writer, Web site owner

Computer Science & Information Technology

You might also like to view...

Good debugging techniques include:

a. Inserting output statements in your program. b. Tracing variables c. Using an IDE debugger d. All of the above

Computer Science & Information Technology

There are three key components to PSP: _______, _______ and _________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

?When you ____ a copied file, Windows copies it from the Clipboard to the location you specify.

A. ?paste B. ?install C. ?place D. ?insert

Computer Science & Information Technology

________ is the security guarantee that people who intercept messages cannot read them.

A. Confidentiality B. Encryption C. Availability D. Integrity

Computer Science & Information Technology