Answer:
you are
Explanation:
Answer:
Ay yoooo wsp
1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:
4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:
Network controls that would meet the requirements is option a) Stateful Firewall
Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEPWhat is the statement about?A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.
A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.
Learn more about network administrator from
https://brainly.com/question/28729189
#SPJ1
move the chart select the range a4:f11. use the quick analysis feature to create a clustered column chart. move the chart to a sheet named annual attendance chart. to a sheet named annual attendance chart..
Ribbon1. Select cells A4:F11 and then click the Insert tab.2. In the Charts group, click the Column button, and under the 2-D Column, click Clustered Column.
What is clustered column?
Ribbon (2)
1. Select cells A4:F11, and then click the Insert tab.
2. In the Charts group, click the Create Chart Dialog Box Launcher (or click any of the chart buttons, and then All Chart Types).
3. In the Insert Chart dialog box, in the right pane, under Column, click ClusteredColumn (first item), and then click OK. Alternatively, in the right pane, double-click Clustered Column.
Keyboard
1. Select cells A4:F11, press ALT (or F10 or press F6 two times), N, and then C.
2. In the Gallery, with Clustered Column selected (first item), press ENTER.
Keyboard (2)
1. Select cells A4:F11, and then press ALT (or F10 or press F6 two times), N, K (or press C (or N, or Q, or B, or A, or D, or O), and then A (or TAB or ARROW to select All Chart Types and press ENTER (or SPACEBAR))).
2. In the Insert Chart dialog box, press TAB to move to the chart-type gallery, use the arrow keys to select Clustered Column (first item), if necessary, and then press enter.
Keyboard (3)
1. Click the Name box, type A4:F11, and then press ENTER. Alternatively, select the range A4:F11. Press ALT+F1.
The default column chart behavior is a clustered column chart, in which data from every series are shown near to one another at the same category axis value. A sort of graph used to compare data sets is a clustered column chart. They are ideal for categorizing data and helping to see it. Clustered column charts are frequently used to compare sales statistics or other time-varying data. A clustered column chart shows multiple data series in clustered vertical columns. Vertical bars are organized by category because all data series have the same axis labels. Clustered columns make it possible to compare many series directly, but they rapidly become overly complicated visually.To learn more about clustered columns refer to:
https://brainly.com/question/25807912
#SPJ4
1. Write a query in SQL to list the following information of the artists in movie industry. Limit this information to only 5 artists. Sort the information by age descending order. Full name : first name and last name separated by space Age: Current age Address: State that he resides Contact number: Phone number
Answer:
1) SQL Server
SELECT Top 5 concate(first name,' ',last name) AS Full name, Current age AS Age, state AS Address, Phone number AS Contact number from actor ORDERBY Current age DSC ;
2) MySQL
SELECT concate(first name,' ',last name) AS Full name, Current age AS Age, state AS Address, Phone number AS Contact number from actor ORDERBY Current age DSC limit 5;
Explanation:
There two queries first having syntax works fine in SQL server and later with MySQL. All bold faced words are sql keywords. I assumed the tablename is actor as table name is not given if table name is any other replace actor with that name.
alle Mbawah: Attempt 1 How does a bystander become an advocate? By harassing the bully until he or she stops the harmful activity By taking action in either reporting the bully or otherwise supporting the victim By ignoring the situation By becoming a victim him- or herself to show concern Question 3 (5 points) alle Mbawah : Attempt 1 How does a bystander become an advocate ? By harassing the bully until he or she stops the harmful activity By taking action in either reporting the bully or otherwise supporting the victim By ignoring the situation By becoming a victim him- or herself to show concern Question 3 ( 5 points )what is the ans
Answer:By reporting the bully or supporting the victim that's what I would do
Explanation:
A bystander becomes an advocate by taking action in either reporting the bully or otherwise supporting the victim. Thus, the correct option for this question is B.
What is an Advocate?An advocate may be characterized as a type of person that supports another person in order to help you express your views and wishes, and help you stand up for your rights. It is the one who pleads with another's cause, who helps another by defending or comforting him.
According to the context of the story, a bystander has their own responsibilities in case of any harmful activities going out in their surroundings. They are required to take action in either reporting the bully or otherwise supporting the victim. In this case, harmful activities reduce from our surroundings. Everything required some actions and initiations.
Therefore, the correct option for this question is B.
To learn more about Advocate, refer to the link:
https://brainly.com/question/26054678
#SPJ2
DOES THE GATEWAY NE56R41u have touch screen capabilities?
A.) Yes it does
B.) No it doesn't
Answer:
thats a good question
Explanation:
thats a good one
An application lists all the files and subdirectories in its web folder. This indicates which of the following weaknesses on the application?
a. Directory Listing
b. Cross Site Scripting
c. Session Hijacking
Directory Listing is the correct response. The web folder of an application contains a list of all the files and subdirectories. This reveals application flaws with Directory Listing.
a subfolder is a computerised organisational directory that is nested inside another directory. Sections of your main website can be divided using subdirectories, which are content subfolders. Each subfolder shares the top-level domain (TLD) of your website, and its URL structure always follows the root domain. Examples of subdirectories include all of the following: example.com/shop. The subdirectory appears in a URL after the root directory or domain name. Therefore, hubspot.com/pricing might be a subfolder URL. Alternatively, it may be something more challenging like pricing/sales.hubspot.com. Typically, a single subdirectory within this tree structure is referred to as a directory or subdirectory, respectively.
Learn more about subdirectories here:
https://brainly.com/question/29360568
#SPJ4
As part of your image organization, you need to make sure you have folders and subfolders with appropriate headings.
Organizing images into folders and subfolders with appropriate headings is crucial for efficient image management. Having a well-structured and logical hierarchy of folders and subfolders makes it easy to find and retrieve images quickly.
Image organization using folders and subfolders with appropriate headings. Here's a step-by-step explanation:
1. Determine the main categories for your images: Start by identifying the primary subjects or themes of your images. These categories will become the main folders in your organization system.
2. Create main folders: For each category you've identified, create a new folder and give it an appropriate heading that accurately represents the content inside.
3. Sort images into main folders: Go through your images and place them in the corresponding main folders based on their subject or theme.
4. Identify subcategories within each main folder: For each main folder, determine if there are any subcategories or more specific themes that would help further organize your images.
5. Create subfolders with appropriate headings: Within each main folder, create subfolders for each identified subcategory, and give them appropriate headings that accurately represent the content inside.
6. Sort images into subfolders: Go through the images in each main folder and move them to the appropriate subfolders based on their more specific subject or theme.
7. Review and adjust as needed: Periodically review your folder and subfolder organization to ensure it remains accurate and efficient. Make any necessary adjustments to headings or folder structure as your image collection grows or changes.
By following these steps, you can effectively organize your images using folders and subfolders with appropriate headings, making it easier to locate and manage your image files.
For more questions on image management:
https://brainly.com/question/31104217
#SPJ11
1. Utilizing Microsoft VISIO, you are to leverage the content within the prescribed narrative to develop an Entity Relationship Diagram (ERD). Make use of the 'Crow's Foot Database Notation' template available within VISIO.
1.1. You will be constructing the entities [Tables] found within the schemas associated with the first letter of your last name.
Student Last Name
A -F
K-0
P -T
U-7
Schema
1 and 2 as identified in 6.4.1.1.
1 and 3 as identified in 6.4.1.1.
1 and 4 as identified in 6.4.1.1.
1 and 5 as identified in 6.4.1.1.
1 and 6 as identified in 6.4.1.1.
1.2. Your ERD must include the following items:
• All entities must be shown with their appropriate attributes and attribute values (variable type and length where applicable)
•All Primary keys and Foreign Keys must be properly marked
Differentiate between standard entities and intersection entities, utilize rounded corners on tables for
To create an Entity Relationship Diagram (ERD) using Microsoft Visio, here is what you need to do.
Steps for creating ERD using VisioOpen Microsoft Visio and select the 'Crow's Foot Database Notation' template.Identify the schemas associated with the first letter of your last name. For example, if your last name starts with A-F, choose Schema 1 and Schema 2.Construct the entities (tables) within the chosen schemas based on the provided narrative.Include all necessary attributes and their values for each entity, specifying variable type and length where applicable.Properly mark the Primary Keys and Foreign Keys within the entities.Differentiate between standard entities and intersection entities by using rounded corners on tables.By following these steps, you can create an ERD using Microsoft Visio, representing the entities, attributes, relationships, and key identifiers of the database schema associated with your given criteria.
Learn more about Microsoft Visio:
https://brainly.com/question/29340759
#SPJ1
Select one among the the main categories of computer software, which one is not a category
of Computer software? (1 mark) US
Application
Programs
Utilities
Systems
Answer:
utilities
Explanation:
the other 3 are Cs programs
How is a collapsed qubit similar to a bit?
The collapsed qubit similar to a bit as it has a single value of either 0 or 1.
What is the difference between a qubit and a bit?Note that a classical computer is one that has a memory composed of bits that is, each bit is known to hold a one or a zero.
Note also that a qubits (quantum bits) is one that can hold a one, a zero or can also superposition the both.
Hence, The collapsed qubit similar to a bit as it has a single value of either 0 or 1.
See full question below
How is a collapsed qubit similar to a bit? It can stay in a state of superposition. It is still dependent on its counterparts. It has a single value of either 0 or 1. It has numerous potential paths to follow.
Learn more about qubit from
https://brainly.com/question/24196479
#SPJ1
in the situation above, what ict trend andy used to connect with his friends and relatives
The ICT trend that Andy can use to connect with his friends and relatives such that they can maintain face-to-face communication is video Conferencing.
What are ICT trends?ICT trends refer to those innovations that allow us to communicate and interact with people on a wide scale. There are different situations that would require a person to use ICT trends for interactions.
If Andy has family and friends abroad and wants to keep in touch with them, video conferencing would give him the desired effect.
Learn more about ICT trends here:
https://brainly.com/question/13724249
#SPJ1
How does a computer go through technical stages when booting up and navigating to the sample website? Answer the question using Wireshark screenshots.
When a computer is turned on, it goes through several technical stages before it can navigate to a sample website. The following are the basic steps involved in booting up a computer and accessing a website:
How to explain the informationPower On Self Test (POST): When a computer is turned on, it undergoes a Power On Self Test (POST) process, which checks the hardware components such as RAM, hard drive, CPU, and other peripherals to ensure they are functioning properly.
Basic Input/Output System (BIOS) startup: Once the POST process is complete, the BIOS program stored in a chip on the motherboard is loaded. The BIOS program initializes the hardware components and prepares the system for booting.
Boot Loader: After the BIOS startup is complete, the boot loader program is loaded. This program is responsible for loading the operating system into the computer's memory.
Operating System (OS) startup: Once the boot loader program has loaded the operating system, the OS startup process begins. During this process, the OS initializes the hardware, loads device drivers, and starts system services.
Web browser launch: After the OS startup is complete, the user can launch a web browser. The web browser program is loaded into the memory, and the user can navigate to a sample website.
DNS Lookup: When the user types in the website address, the computer performs a Domain Name System (DNS) lookup to translate the website name into an IP address.
HTTP Request: After the IP address is obtained, the web browser sends an HTTP request to the web server that hosts the website.
Website content delivery: Once the web server receives the HTTP request, it sends back the website content to the web browser, and the website is displayed on the user's screen.
These are the basic technical stages involved in booting up a computer and navigating to a sample website.
Learn more about computer on;
https://brainly.com/question/24540334
#SPJ1
Write a program that accepts a number as input, and prints just the decimal portion. Your program should also work if a
negative number is inputted by the user. Lastly, write a print statement that states 'The final outcome is: followed by the
decimal portion, and remember to change the final outcome to string.
Sample Run
Enter a number: 15.789
Sample Output
The final outcome is: 0.789
Answer:
answer for python.
number = float(input("Enter a number: "))
decimal_portion = number - int(number)
if decimal_portion < 0:
decimal_portion *= -1
print("The final outcome is: " + str(decimal_portion))
Explanation:
The program first prompts the user to enter a number and stores it in the number variable as a floating-point value. Then, the decimal portion of the number is calculated by subtracting the integer portion (obtained through int(number)) from the original number. If the decimal portion is negative, it is multiplied by -1 to ensure that it is positive. Finally, the result is printed with a descriptive message.
Compare the strengths and limitations of modern computer programming
languages.
The strengths and limitations of modern computer programming languages is that:
It has Translation free.It possess High speedIt is said to be Machine dependent. It is Hard to learn.It need a Compiler and an Interpreter.What are the limitations of programming languages?The C programming language is one that do not detect errors for all the line of coding.
Hence, it will check the bugs only when the complete coding is done. It does not show namespace property.
Hence, The strengths and limitations of modern computer programming languages is that:
It has Translation free.It possess High speedIt is said to be Machine dependent. It is Hard to learn.It need a Compiler and an Interpreter.Learn more about programming languages from
https://brainly.com/question/16936315
#SPJ1
Write a function "doubleChar(" str) which returns a string where for every character in the original string, there are two characters.
Answer:
//Begin class definition
public class DoubleCharTest{
//Begin the main method
public static void main(String [ ] args){
//Call the doubleChar method and pass some argument
System.out.println(doubleChar("There"));
}
//Method doubleChar
//Receives the original string as parameter
//Returns a new string where for every character in
//the original string, there are two characters
public static String doubleChar(String str){
//Initialize the new string to empty string
String newString = "";
//loop through each character in the original string
for(int i=0; i<str.length(); i++){
//At each cycle, get the character at that cycle
//and concatenate it with the new string twice
newString += str.charAt(i) + "" + str.charAt(i);
}
//End the for loop
//Return the new string
return newString;
} //End of the method
} // End of class declaration
Sample Output:TThheerree
Explanation:The code above has been written in Java and it contains comments explaining each line of the code. Kindly go through the comments. The actual lines of executable codes have been written in bold-face to differentiate them from comments.
A sample output has also been given.
Snapshots of the program and sample output have also been attached.
Question
Which of the following binary numbers (base 2) are multiples of 4? CHOOSE TWO ANSWERS.
11100
1101
10110
10100
The binary numbers that are multiples of 4 are; 11100 and 10100
Binary to decimal conversionLet us convert each of the given binary numbers to decimal;
A) 11100 = (1 × 2⁴) + (1 × 2³) + (1 × 2²) + (0 × 2¹) + (0 × 2°) = 16 + 8 + 4 + 0 + 0 = 28
B) 1101 = (1 × 2³) + (1 × 2²) + (0 × 2¹) + (1 × 2°) = 8 + 4 + 0 + 1 = 13
C) 10110 = (1 × 2⁴) + (0 × 2³) + (1 × 2²) + (1 × 2¹) + (0 × 2°) = 16 + 0 + 4 + 2 + 0 = 22
D) 10100 = (1 × 2⁴) + (0 × 2³) + (1 × 2²) + (0 × 2¹) + (0 × 2°) = 16 + 0 + 4 + 0 + 0 = 20
Looking at the decimals, only 20 and 28 are multiples of 4.
Read more about binary to decimal conversion at; https://brainly.com/question/17946394
Which of the below are examples of control structures?
(1) if
(II) if/else
(III) while
(IV) for
I only
I and II only
III and I only
I, II, III, and IV
Answer: (I) if, (II) if/else, (III) while, (IV) for
D. I, II, III, and IV
May I have brainliest please?
A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.
Answer:
Threat assessment
Explanation:
A threat assessment deals with the potential for weaknesses within the existing infrastructure to be exploited.
Threat Assessment is further explained as the practice of determining or ascertaining the credibility and seriousness of a potential threat, and also the probability or chases of the threat will becoming a reality.
Threat assessment is separate to the more established procedure of violence-risk assessment, which seek to forcast an individual's general capacity and tendency to respond to situations violently. Instead, threat assessment aims to interrupt people on a route to commit "predatory or instrumental violence, the type of behavior connected with targeted attacks".
Answer:
Threat assessment
Explanation:
In an IT system, threat assessment is the analysis, evaluation and prevention of actions, events and operations that can greatly affect the system. It explores the potential for weaknesses within existing infrastructure to be exploited.
The threat assessment is a very important assessment that needs to be taken in virtually all domains. Here are a few reasons why it is important in an IT system;
i. Prevention of data loss
ii. Prevention of system or network of systems downtime
In carrying out threat assessment, one might need to do the following;
i. identification and prioritization of infrastructure including the software and hardware applications in the system.
ii. identification of potential threats such as system failure, natural disaster, unwanted access.
iii. identification of vulnerabilities in the system.
iv. analysing controls by determining who has access and who doesn't.
v. analysing the impact of a threat occurrence.
vi. documentation of analysis and evaluation results.
How are special characters added to a Word document
Answer:
through symbols
Explanation:
you have to press insert, symbols, more and then scroll until you find your symbol
The symbols thing might look like ♎
FOR A BRAINLIEST
Create a word problem that involves calculating the volume and surface area of a three-dimensional object.
∙ Cube: surface area 6 s2, volume s3
A sample word problem to calculate the volume and surface area of a three-dimensional object would be: "A logistics company has a wide area that is 300m^2 and has a parking space that is 50m in height and is 12 feet long. Find the volume of the parking space"
What is a Word Problem?This refers to the use of words that describes a real scenario that would lead to a mathematical calculation.
Hence, to make a sample word problem based on the given description, the above description should be helpful, and remember that \(\pi\) is 3.142 when doing your calculations.
Read more about word problems here:
https://brainly.com/question/13818690
#SPJ1
What is a row of data in a database called?
Field,
File,
Record, or
Title
Answer:
A Field
Explanation:
I got it right
Which of these could be a valid IPv4 or IPv6 address?
a
251.70.349.287
b
eeed:6654:2f34:94cf:bfa0:20c9:08e1:bfcd
c
92.169.42.163
d
67d250:4650d2:94b753:f27588:a49175:0e46be:368442:70fd8d
e
146.49.98.20.184.223
f
4b32:3b3d:6cec:8438:d20f:397c
Answer:
F
4b32:3b3d:6cec:8438:d20f:397c
An IP address is a numerical protocol address with an numerical value that is connected by a computer network for communication.
The IPv4 is a 32-bit address and the IPv6 is a 128-bit address. The IPv4 address usually represents dot-decimal notions. Each range from 0 to 255. The Ip address may be represented by hexadecimal, octal and binary decimals. Thus the valid IPv4 could be a 92.169.42.163Hence the correct option is C.
Learn more about which could be the valid IPv4 or 6.
brainly.in/question/35357295.
1 Refer to the plan below and write a Java program called PrintSum which outputs the sum of the (10 marks) ..umbers from 0 up to n, where n is input by the user: Plan Initialise total and counter to 0 Get n from the user
WHILE the counter is <=n
update the total
add 1 to counter print total
The java program that called "PrintSum" that follows the provided plan is given below.
What is the Java program?import java.util.Scanner ;
public class PrintSum {
public static void main(String[] args){
int total =0;
int counter = 0;
Scanner scanner = newScanner(System.in);
System.out.print("Enter a number (n):");
int n = scanner.nextInt();
while (counter <= n) {
total += counter;
counter++;
}
System.out.println(" The sum of numbers from 0 to " +n + " is: " + total);
}
}
How does this work ?This program prompts the user to enter a number (n),then calculates the sum of numbers from 0 to n using a while loop.
The total variable is updated in each iteration of the loop,and the counter is incremented by 1. Finally, the program outputs the calculated sum.
Learn more about Java at:
https://brainly.com/question/26789430
#SPJ1
Complete the class definition.
class vehicle:
def __init__(self,strModel,strColor):
self.model = strModel
self.color = strColor
def __str__(self):
print(self.model)
print(self.color)
myCar = vehicle('SUV','red')
myCar.display()
Answer:
class Vehicle:
def __init__(self, strModel, strColor):
self.model = strModel
self.color = strColor
def __str__(self):
return f"{self.model} {self.color}”
#you can’t just use print statements
myCar = Vehicle('SUV’, ‘red')
"""you haven’t created a display() method, instead, you can use the __str__() method that you have created and when calling, DONT do myCar.__str__(), instead just use print(), since the print() == __str__()
"""
print(myCar);
what is subnetting. what does subnetting mean
Answer:
Subnetting is the practice of dividing a network into two or more smaller networks. It increases routing efficiency, enhances the security of the network and reduces the size of the broadcast domain.
Explanation:
Which type of programming language translates all lines of code together and then executes them at once?
Compiled
Interpreted
Machine
Python
Answer:
Compiled
Explanation:
What is Information Privacy
Answer:
It is just a way to keep things like your address and I.P safe
Explanation:
Imagine that you have an image that is too dark or too bright. Describe how you would alter the RGB settings to brighten or darken it. Give an example.
Sense HAT Emulator Loop Python Assignment
1. Create an instance of the SenseHat class.
2. Write a while loop that iterates count from 1 to 10 and scrolls the value of count in red text with a scroll speed of 0.1.
3. Write a while loop that iterates count from 0 to 30 but the iteration number is advanced by 5 rather than by 1 and scrolls
the value of count in green text with a scroll speed of 0.1.
4. Write a for loop that iterates count from 3 to 98 in steps of 5 and scrolls the value of count in blue text with a scroll speed
of 0.1.
SENSE HAT EMULATOR
Answer:
Here's the Python code for the Sense HAT emulator loop assignment:
from sense_emu import SenseHat
import time
sense = SenseHat()
# Loop 1 - red text, count from 1 to 10
for count in range(1, 11):
sense.show_message(str(count), text_colour=[255, 0, 0], scroll_speed=0.1)
time.sleep(1)
# Loop 2 - green text, count from 0 to 30 (by 5s)
for count in range(0, 31, 5):
sense.show_message(str(count), text_colour=[0, 255, 0], scroll_speed=0.1)
time.sleep(1)
# Loop 3 - blue text, count from 3 to 98 (by 5s)
for count in range(3, 99, 5):
sense.show_message(str(count), text_colour=[0, 0, 255], scroll_speed=0.1)
time.sleep(1)
Explanation:
This code uses the SenseHat class to create an instance of the Sense HAT emulator. It then includes three different loops, each with a different color and range of numbers to iterate through. The show_message() method is used to display the current count value in a scrolling text format, with the specified text color and scroll speed. The sleep() method is used to pause the loop for 1 second between each iteration, so that the text has time to scroll completely before the next iteration begins.
broadcast and cable television transmissions of sporting events are fully protected by copyright law, but the events, games, and statistics themselves are not necessarily covered by the law.
Copyright law protects the original expression of ideas that are fixed in tangible form.
What is Copyright law?Copyright law is a form of intellectual property law that provides exclusive rights to creators of original works, such as literature, music, films, and artwork. Copyright law grants the creator of a work exclusive rights to the work, including the right to reproduce, distribute, create derivative works, perform, and display the work publicly. Copyright law also protects the interests of authors and creators of original works, by providing them with a financial incentive to produce new works and rewarding them for their creativity. Copyright law also helps to ensure that authors are properly credited for their work, as well as ensuring that their works are not used without their permission. In addition, copyright law helps to promote creativity and innovation, by ensuring that original works are protected and incentivizing creators to create new works.
This includes things like broadcasts of sporting events, which typically involve the use of copyrighted works such as music, video, and commentary. However, the events, games, and statistics themselves are not necessarily covered by the law. This is because the facts and ideas behind the events, games, and statistics are not protected by copyright. For example, while a broadcaster may own the copyright to its coverage of a particular game, the facts surrounding the game (e.g. who scored, which team won, etc.) are not protected by copyright.
To learn more about Copyright law
https://brainly.com/question/1078532
#SPJ4