How is a Creative Commons license different from a regular copyright?

Answers

Answer 1

Answer:

Creative Commons license is different from regular copy right because it's more loose and allows the owner to give out their art for others to use.

Explanation:

Creative Commons license isn't as strict as a normal copy right license allowing the owner to give out their art/movie/music for others to use.

[I'm doing this for code.org too :)]


Related Questions

who was the co-developer of first microprocessor ?

Answers

Answer: Busicom

Explanation: The Birth, Evolution and Future of the Microprocessor Abstract: Summary form only given. The world's first microprocessor, the 4004, was co-developed by Busicom, a Japanese manufacturer of calculators, and Intel, a U.S. manufacturer of semiconductors.

A customer calls you and states that her laptop screen is very dim. In order to avoid going to the client's site, which of the following is the first action you should recommend to the customer to perform?
1. Use function keys
2. Set encryption
3. Restart the system
4. None of above

Answers

it depends on the brand of laptop,If it is standard use function key if not None of the above

To prevent computer errors, which of the following characters should not be used in a filename?


– (hyphen)

_ (underscore)

% (percent

* (asterisk)

Answers

Answer:

asterisk

Explanation:

it cannot be used because it is a

Answer:

* asterisk and % percent

Explanation:

Edge Nuity

write a function called orbit that takes three inputs and returns three outputs. our function is related to a planet that is in orbit around a star. remember that planets have elliptical orbits, like this:

Answers

Answer:

function [circT, ram1T, ram2T] = orbit(major, minor, velo)

a = major;

b = minor;

v = velo;

days = 86400;

   % Circular approximation

   circT = ((2 * pi *sqrt((a^2) + (b^2))/(2))/ v )/ days;

   

   % Ramanujan's first approximation

   ram1T = (pi * (3 * (a + b) - sqrt((3 * a + b) * (a + 3 * b)))/v)/days;

   

   % Ramanujan's second approximation

   h = ((a - b)^2) / ((a + b)^2)

   ram2T = (pi * (a + b) * (1 + (3 * h )/ (10 + sqrt(4 - 3 * h)))/v)/days;

end

Explanation:

A planet is a celestial body that (a) orbits the sun and (b) has enough mass for its own gravity to outweigh the forces of rigid bodies and establish hydrostatic equilibrium.

The Sun (star) drags planets down into an orbit around it with its gravitational attraction. The elliptical course of their orbit is maintained by this gravity, which is a crucial force. As this force of gravity is directly proportional to mass and inversely proportional to the distance between them, if it changes, it will have an impact on the celestial bodies that revolve around it, such as planets. According to the query, when the star's gravity grows, planets will be more drawn towards the sun, reducing the distance between the star and the planet. As a result, the orbital path will get smaller, and the orbital period will increase.

Learn more about A planet here:

https://brainly.com/question/30040861

#SPJ4

Sebastian is working on a web page that includes both essential and non-essential information about an event that is happening at his shop. How

Answers

Sebastian can organize the essential and non-essential information about the event on his webpage in the following steps:

1. Identify the essential information: Determine the key details that visitors to the webpage need to know about the event. This may include the date, time, location, and purpose of the event.

2. Highlight the essential information: Make sure that the essential information stands out on the webpage. Use headings, bullet points, or bold text to draw attention to these important details.

3. Provide additional details: Include non-essential information about the event that may be of interest to visitors but is not crucial for understanding the event. This could include background information, special features, or testimonials.

4. Use clear formatting: Arrange the essential and non-essential information in a logical and easy-to-read manner. Consider using sections or tabs to separate the different types of information, making it clear what is essential and what is non-essential.

5. Prioritize the essential information: Place the essential information prominently on the webpage so that it is easily noticeable. This ensures that visitors can quickly find the most important details without having to search through the entire page.

In summary, Sebastian can organize the essential and non-essential information about the event on his webpage by identifying the key details, highlighting them, providing additional non-essential details, using clear formatting, and prioritizing the essential information.

#SPJ11

Learn more about Information

https://brainly.com/question/26260220

Sebastian can organize the web page by distinguishing between essential and non-essential information about the event happening at his shop. Here's how he can do it:


1. Identify essential information: Sebastian should determine the key details that visitors must know about the event, such as the date, time, location, and any important announcements or updates.


2. Prioritize essential information: Once he has identified the essential information, Sebastian should place it prominently on the web page, ensuring that it is easily visible and accessible to visitors. This could include using headings, subheadings, bullet points, or highlighting key details.


3. Separate non-essential information: Sebastian should then identify any additional details or supplementary information that is not essential for visitors to know. This could include things like event background, history, or optional activities.

4. Organize non-essential information: Sebastian can create separate sections or tabs on the web page to present the non-essential information. This way, visitors who are interested in learning more can easily access it, while those who are looking for essential details can find them without being overwhelmed.

5. Use clear and concise language: Regardless of whether it's essential or non-essential information, Sebastian should ensure that all text on the web page is written in a clear, concise, and easy-to-understand manner. This will help visitors quickly grasp the important details and navigate through the web page effectively.

By following these steps, Sebastian can create a well-organized web page that presents both essential and non-essential information about the event happening at his shop.

#SPJ11

Learn more about Web page here:

brainly.com/question/32613341

There are some processes that need to be executed. Amount of a load that process causes on a server that runs it, is being represented by a single integer. Total load caused on a server is the sum of the loads of all the processes that run on that server. You have at your disposal two servers, on which mentioned processes can be run, Your goal is to distribute given processes between those two servers in the way that, absolute difference of their loads will be minimized. Write a function: class solution { public int solution(int[] A); } (JAVA) that, given an array of A of N integers, of which represents loads caused by successive processes, the function should return the minimum absolute difference of server loads. For example, given array A such that:


A[0] = 1

A[1] = 2

A[2] = 3

A[3] = 4

A[4] = 5


Your function should return 1. We can distribute the processes with loads 1,2,3,4 to the first server and 3,5 to the second one, so that their total loads will be 7 and 8, respectively, and the difference of their loads will be equal to 1

Answers

The Java code that solves this problem has been written in  the space below

How to write the Java code

public class Solution {

   public int solution(int[] A) {

       int totalLoad = 0;

       for (int load : A) {

           totalLoad += load;

       }

       int server1Load = 0;

       int server2Load = totalLoad;

       int minAbsoluteDifference = Integer.MAX_VALUE;

       for (int i = 0; i < A.length - 1; i++) {

           server1Load += A[i];

           server2Load -= A[i];

           int absoluteDifference = Math.abs(server1Load - server2Load);

           minAbsoluteDifference = Math.min(minAbsoluteDifference, absoluteDifference);

       }

       return minAbsoluteDifference;

   }

}

Read mroe on Java code here https://brainly.com/question/25458754

#SPJ1

A device which lets you interact with the computer


Answers

Answer:

Input, output, storage.

Explanation:

Input is used to interact with, or send data to the computer (mouse, keyboards, etc.). Output provides output to the user from the computer (monitors, printers, etc.). And storage which stores data processed by the computer (hard drives, flash drives, etc.).

Answer:

The answer are;

1 . mouse

2 . keyboard

what ribbon command on the home tab can you use to change a cell fill color

Answers

The ribbon command.

The ribbon command can be found in Microsoft word and the other files types seen on the home button, it can be sued to change the color. It organizes the features of the program and enables the viewer to work efficiently. The tab is dedicated to all the main functions.

Thus the answer is explained in steps.

The first step is for changing colors is the option of select those cells that color you want to change. Second, the command of ctrl+Shift+F. Excel displays the Format Cells dialog box. The third step is you use the Fill tab is selected. In the last step use the color palette and select your color, then click OK.

Find out more information about the ribbons command.

brainly.com/question/26113348.

Your question was incomplete.

The IP address and the port are both numbers. Which statement is true?

A computer has many IP addresses and one port.

A computer has many IP addresses and many ports.

A computer has one IP address and one port.

A computer has one IP address and many ports.

Answers

Answer:

i believe it is the last one

Answer:

The answers are in different orders for everybody, the correct answer is A computer has one IP address and many ports.

Determining which computer platform (operating system) would be best for a particular student often depends on what the student wants to study and in which industry she or he wants to enter after graduation. Students who plan to study graphic design or want to focus on photo production or publishing should strongly consider the __ platform since it is generally considered the industry standard in those fields.

Answers

Answer: Window OS

Explanation:

Based on the information given, it should be noted that the students who plan to study graphic design should consider the Window OS platform since it is considered to be the industry standard in those fields.

Microsoft Windows, also refered to as the Windows OS, is a computer operating system that's developed by Microsoft to run personal computers. It has the first graphical user interface and also, the Windows OS dominates the personal computer market.

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

Which of the following is opened when the Find command is clicked? Question 9 options: Navigation Pane Insert Hyperlink dialog box Bookmark dialog box Search Pane.

Answers

The element, from the following options, which is opened when the find command is clicked is the search pane.

What is find command?

Find command is the command which is used to find the list of files and their location.

Find command can be used in different manners-

To find the different files in a system.Find command can find the files by their name, size, date or other information related to the required document.This command can be modified with the requirement of the search.

The options for the given problem are-

Navigation Pane Insert- It is used to show the navigation pane in word or similar space. Hyperlink dialog box-This open, when the insert hyperlink command is clicked.Bookmark dialog box-This opens, when the bookmark command is clicked.Search Pane- Search pane is opens, when the find commond is clicked.Thus, the element, from the following options, which is opened when the find command is clicked is the search pane.

Learn more about the find command here:

https://brainly.com/question/25243683

who is father of computer?​

Answers

Charles cabbage is thehshshshdhshshshshshdh

_____ includes the technologies used to support virtual communities and the sharing of content. 1. social media 2.streaming 3. game-based learning

Answers

Answer: it’s A, social media

Explanation:

Social media are interactive digital channels that enable the production and exchange of information. The correct option is 1.

What is Social Media?

Social media are interactive digital channels that enable the production and exchange of information, ideas, hobbies, and other kinds of expression via virtual communities and networks.

Social media includes the technologies used to support virtual communities and the sharing of content.

Hence, the correct option is 1.

Learn more about Social Media:

https://brainly.com/question/18958181

#SPJ2

pivottable are based on?

Answers

A pivot table is known to be based on the summary of your data and it is one that  report on different topics or explore trends.

What is pivot table?

This is known to be a summary of one's data, that can be shown in a chart that gives one room to report on and look at trends based on one's information.

Note that It often shows the value of one item that is the Base Field and also the percentage of other item known to be the Base Item.

Learn more about from

https://brainly.com/question/2222360

#SPJ1

someone pls help me w this

someone pls help me w this

Answers

Answer:

pay full attention, prepare intro, attend events

Explanation:

i don't really know but it feels like common sense so im pretty sure

don't take my work for it lol

How can malicious code caused damage?

Answers

Malware can be spread through various means, such as email attachments, infected websites, or software downloads. Once it infects a system, it can cause damage in a number of ways.

What are the type of malware?

One common type of malware is a virus, which can replicate itself and spread to other computers. Viruses can corrupt or delete files, steal personal information, and even cause a system to crash.

Another type of malware is a Trojan horse, which disguises itself as legitimate software but actually contains harmful code.

Trojans can give attackers remote access to a system, allowing them to steal sensitive data or control the system for their own purposes.

Ransomware is another type of malware that encrypts files on a system and demands payment in exchange for the decryption key.

Learn more about malware at

https://brainly.com/question/14276107

#SPJ11

The ____ is where ongoing communications between a sender and a receiver, somewhat like a telephone conversation, are set up, maintained, and then terminated, or torn down,as needed.

Answers

The session layer is where ongoing communications between a sender and a receiver, somewhat like a telephone conversation, are set up, maintained, and then terminated, or torn down, as needed.

In the field of computer studies, we can describe the session layer as the fifth layer or part of the Open Systems Interconnection (OSI) model and its function is to manage the users from different computers to interact and make communications with each other.

Each dialog that occurs between two systems is referred to as a session by the session layer. The system layer establishes and manages and then terminates each session between end-term users effectively.

As the main pattern or theory of the session layer is similar to that of a telephone conversation hence we can say that both processes have similarities between them.

To learn more about session layers, click here:

https://brainly.com/question/4910167

#SPJ4

can someone help me with this project im confused

can someone help me with this project im confused
can someone help me with this project im confused
can someone help me with this project im confused

Answers

u have to progrem a math algorithum

a nested if statement only executes if the if statement in which it is nested evaluates to true.
true/false

Answers

True. A conditional statement that is nested inside another if statement is referred to as a nested if statement. As the nested if statement will only be executed if the outer if statement evaluates to true, this enables more complex decision-making in the code.

In other words, the outer if statement's condition is what determines whether the nested if statement applies. No matter if the nested if statement's own condition is true or false, it will not be performed if the outer if statement's condition is false. Given that the nested if statement will only be run if it is genuinely essential, this can aid in code optimization and reduce the need for pointless computations. It's critical to check that the logic of the nested if statement is sound because any flaws could cause the programme to behave unexpectedly.

learn more about Nested here:

brainly.com/question/13971698

#SPJ4

what is the importance of keeping information private and secure online​

Answers

Keeping information private and secure online can ensure your safety. Many people can figure out your full name, address, school name, etc through the internet.

The ______ process retains copies of data over extended periods of time in order to meet legal and operational requirements.

Answers

Answer:

archive

Explanation:

the archive process retains copies of data over extended periods of tike in order to meet legsl ane operational requirements

I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I try to check it, it comes up with a Traceback error.

My code:

b = float(input("Enter Temperature: "))

Traceback (most recent call last):
File "./prog.py", line 7, in
EOFError: EOF when reading a line

Answers

Answer:

The error is because you wrapped the input in float. First record the input and then modify it.

Explanation:

b =  input("enter temp:")

b = float(b)

Select the correct text in the passage.
Select the sentence that is not the correct use of technology in parenting.
Technology has helped parents to access a vast information resource due to the presence of the internet. They can show a range of education
material like nursery rhymes, stories, scientific concepts, and so on conveniently on their smartphones. Teachers can coordinate with the
parents about the child's progress due to smartphones and various applications on it. Some parents have replaced the customary practice of
reading a bedtime story to children with a television show of the child's choice.
Reset
Next

Answers

Answer:

some parents have replaced the customary practice of reading a bedtime story to childern with a television show of the child's choice

Explanation:

Aking sense of the death, the social consolidation after a death occurs, and caring for the dying are all functions of the: Multiple choice question. Sociology of death. Determinants of death. Death system. Psychology of death

Answers

The Death System is responsible for understanding the death, the social consolidation after a death occurs, and caring for the dying as it is the functions of the Death System.

The Death System comprises funeral homes, hospitals, cemeteries, crematoria, and various other entities that work to address the needs of the dying, the deceased, and the bereaved.A good understanding of the Death System is critical since it will help in comprehending the ways in which death and dying can affect various sectors of society.

The sociology of death is the study of the social structure, processes, and culture that surrounds death and dying. The determinants of death are the factors that cause or contribute to an individual's death. The psychology of death is the study of the psychological and emotional responses to death and dying.

To know more about responsible visit:

https://brainly.com/question/28903029

#SPJ11

Data retrieved from web queries do not include __________ and contents of __________.

Answers

Data retrieved from web queries do not include pictures and contents of scripts.

Data retrieval is the process to obtain data from a database management system. And, web application or system is a software program that is stored on a remote server and provided over the Internet through a browser interface. In order to retrieve data from web-based systems, web queries are used to fetch data from web databases. When data is retrieved from web-based database systems through web queries, the resulting data do not include pictures and contents of scripts.

You can learn more about data retrieval at

brainly.com/question/14939418

#SPJ4

Microcomputer other device on the network that requests and utilizes network resources Hub Switch Client Server

Answers

Answer:

Client.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

A client can be defined as a microcomputer or other device on the network that requests and utilizes network resources.

These network resources that are being requested by the client (client computer) are typically made available by a dedicated computer on the network known as a server.

True or False: Encryption is an effective deterrent against breaches of PHI maintained electronically.

Answers

True. Encryption is an effective method of protecting PHI maintained electronically. It ensures that even if a breach occurs, the information cannot be read or accessed without the appropriate decryption key.

thereby reducing the risk of unauthorized disclosure or theft. It is also a requirement under HIPAA regulations to protect electronic PHI. Decryption is the process of converting encrypted data back into its original form using a decryption key. Encryption is the process of converting plain text data into a scrambled form, which can only be read by someone with the decryption key. Decryption is used to protect sensitive information from unauthorized access by hackers and other malicious actors.

The process of decryption involves using the decryption key to reverse the encryption process, transforming the encrypted data back into its original form. Decryption is used in various contexts, including online transactions, secure messaging, and data storage. Decryption can be done using software tools, such as decryption software, or by hand using mathematical algorithms.

However, decryption can also be a security risk if the decryption key falls into the wrong hands. It is therefore important to use strong encryption algorithms and to store decryption keys securely.

Learn more about Decryption here:

https://brainly.com/question/29765762

#SPJ11

hubspot - if explicit data is information that is intentionally shared between a contact and a company, what is implicit data?

Answers

Implicit data is data that is collected about a contact without their direct knowledge or permission. It can include information such as browsing or search history, IP address, geolocation, and other online activity.

What is IP address?
An IP address (Internet Protocol address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two primary functions: host or network interface identification and location addressing. An IP address consists of two parts: the network number and the host number. It is a unique identifier that is used to identify computers and other devices on a network. It also helps in providing routing information in the network. IP addresses are typically written in decimal numbers, separated by periods. They are also written in binary numbers, but this is not common.

To know more about IP address
https://brainly.com/question/14219853
#SPJ4

create a stored procedure called updateproductprice and test it. (4 points) the updateproductprice sproc should take 2 input parameters, productid and price create a stored procedure that can be used to update the salesprice of a product. make sure the stored procedure also adds a row to the productpricehistory table to maintain price history.

Answers

To create the "updateproductprice" stored procedure, which updates the sales price of a product and maintains price history, follow these steps:

How to create the "updateproductprice" stored procedure?

1. Begin by creating the stored procedure using the CREATE PROCEDURE statement in your database management system. Define the input parameters "productid" and "price" to capture the product ID and the new sales price.

2. Inside the stored procedure, use an UPDATE statement to modify the sales price of the product in the product table. Set the price column to the value passed in the "price" parameter, for the product with the corresponding "productid".

3. After updating the sales price, use an INSERT statement to add a new row to the productpricehistory table. Include the "productid", "price", and the current timestamp to record the price change and maintain price history. This table should have columns such as productid, price, and timestamp.

4. Finally, end the stored procedure.

Learn more about: updateproductprice

brainly.com/question/30032641

#SPJ11

Other Questions
What is the predicted dominant lewis structure if satisfying the octet rule is the top criterion? Yeah i need help someone lol type the value that best answers the question. identify the daily individual income that the united nations defines as living in poverty. In a certain company, there were five candidates running for President. After the vots were tallied, it turned out that Victor, like in the election, finished in thir place, and david beat him. Greg said that he didn't come in first, but he also didn't come in last. Mac in an interview, said that in this election he wasn't able to win, but at least he was one place hight than his old rival Bill. What place did each candidate come in? 2 mi equal how many ft? Solve the system of equations algebraically: y = -x2 + 2x + 4 and y = 4 - x. which organ is part of the body system that transports nutrients from food through the entire body A gas sample has a temperature of 19 C with an unknown volume. Thesame gas has a volume of 464 mL when the temperature is 90. C, with nochange in the pressure or amount of gas. 65 POINTS!!!!!!!! PLZ HELP ME :((((((( YOU MUST GIVE 3 APPROPRIATE ANSWERSSSPlutonian Tickle-bellies have a sex determination system just like mammals. Hairy Snout is aholandric trait (carried on the Y chromosome). MyxRotcccc, a handsome male Tickle-belly, haslovely orange hair on his snout. He and his mate, OrgggWny, have six offspring, three boys andthree girls. Please answer the following questions about this family.a. How many of MyxRotcccc's and OrgggWny's offspring have hairy snouts? Can you predictwhich ones?b. Their eldest son, Bob, marries and has a son. What is the chance that Bob's son will also havea hairy snout?c. JoKchew, MyxRotcccc's and OrgggWny's youngest daughter, marries a male who has asmooth, hairless purple snout. She has eight offspring, each one lovelier than the last, and allboys. What percentage of these offspring do you expect to have hairy snouts? Explain. Chef Ramsy used 1/4 of a bag of flour to make some muffins and twice as many cupcakes.The amount of flour he used for each muffins was 3 times as much as each cupcake.Chef Ramsy used 5/6 of the remaining bag of flour on a cake.He used 256.5g more flour on the cake than the muffins.What friction of the bag of flour was used on the muffins?How much flour was there in the bag at first? In the book to kill a mocking bird, Describe Maycomb County. what is the major membrane receptor involved with focal adhesions? What is the equation of a line having a slope of 5 and whose y-intercept is 8? a laser with a power of 1.0 mw has a beam radius of 1.0 mm. what is the peak value of the electric field in that beam? ( c=3.0108m/s , 0=4107tm/a , 0=8.851012c2/nm2 ) 2) Palm Spring is 718 km (446 miles) southwest of San Jose. The plate under Palm Springs is moving northward at about 36 mm per year relative to the plate under San Jose. Given this rate of movement, how long will it take for Palm Springs to be located next to San Jose? ILL GIVE BRAINLIEST !! Mental or behavioral acts that reduce anxiety in social situations, such as avoiding eye contact or rehearsing sentences before speaking are called ________.cognitive restructuresruminationsobsessionssafety behaviors In an operating lease in which the assets economic life and lease term are different:________ The process of taking cash flow that is received or paid in the future and stating that cash flow in present value terms is called discounting. A. True B. False Solve for x : 0.4 ( 2 4) +0.6x = 1.4A. x = 2.x = 5.4c.x = -0.2D.x = 3