When a copyright for work has expired the work is then said to be in the

Answers

Answer 1

Answer:

Public Domain

Explanation:

Came to me in a dream

Answer 2

Answer:

Public Domain. This means that the work is no longer under copyright protection and can be used by anyone.

Explanation:

Hope this helps!


Related Questions

Which programming language uses objects? C++ ALGOL Pascal BASIC

Answers

Answer:

C++

Explanation:

I am a c++ dev

Answer:

its A

C++

Explanation:

Youre amazing

What is Azure Serverless?

What is Azure Serverless?

Answers

Answer:

Azure Serverless is a cloud computing model offered by Microsoft Azure that allows developers to build and run applications and services without managing the underlying infrastructure. It is designed to eliminate the need for developers to worry about server maintenance, scaling, and availability, and to allow them to focus on writing code and delivering business value. With Azure Serverless, developers can deploy code in small, independently deployable functions that are automatically scaled and managed by the cloud provider.

Explanation:

Who designed the Analytical Engine in the 1830s? Alan Turing Alan Turing Charles Babbage Charles Babbage Bill Gates Bill Gates Steve Wozniak Steve Wozniak

Answers

Charles Babbage Charles Babbage

Read the following Python code:

pets = 2
binaryPets = bin(pets)
print(binaryPets)

Which of the following is the correct output? (5 points)

0b10
0d10
0p10
0x10

Answers

The correct output for the given Python code would be option A: 0b10.

What is the Python code?

The value 2 is assigned to the variable named "pets" in the provided Python code. Afterwards, the decimal value of pets (2) is transformed into binary format through the utilization of the bin() function. The function bin() produces a binary value in string form, and adds the prefix "0b" to indicate this.

Thus, the result displayed for binaryPets upon printing will be 0b10. Indicating that a value is in binary format is done by adding the prefix '0b'. In binary, the decimal value 2 is represented by 10.

Learn more about Python code from

https://brainly.com/question/26497128

#SPJ1

fill in the blank. work related information posted to social networking sites or discussed in public may create___that can be exploited by the unauthorized recipient.

Answers

Social networking site posts about work-related topics or public discussions could lead to vulnerability that an unauthorized recipient could use against them.

Which OPSEC countermeasures come to mind?

Five. Use OPSEC Countermeasures: As an illustration of countermeasures, being aware of the environment, comprehending OPSEC and data aggregation, using social media with prudence by limiting the quantity of personal information shared, and knowing what an Airman's agency considers important information are just a few.

What do the terms "important information and indicators list" mean?

Including your capabilities, actions, constraints, and intentions, a crucial information list (CIL) is a compilation of your most important facts. PII, health data, and travel schedules are examples of personal information that can be included in critical information.

To know more about vulnerability visit :-

https://brainly.com/question/27913894

#SPJ4

Which meter would you use to determine which lamp is defective in the shortest possible time? Explain how you would use this meter and why.

Answers

Answer:

bla bla bla bla

Explanation:

I dont anther stand

Describe the examples of expressions commonly used in business letters and other written communications with some clearer alternatives:

Answers

When writing business letters and other written communications, it is important to use expressions that convey your message clearly and professionally.

Here are some examples of commonly used expressions in business letters along with clearer alternatives:

1. "Enclosed please find" → "I have enclosed"

  This phrase is often used to refer to attached documents. Instead, simply state that you have enclosed the documents.

2. "As per our conversation" → "As we discussed"

  Rather than using a formal phrase, opt for a more conversational tone to refer to previous discussions.

3. "Please be advised that" → "I want to inform you that" or "This is to let you know that"

  Instead of using a lengthy phrase, use more straightforward language to convey your message.

4. "In regard to" → "Regarding" or "Regarding the matter of"

  Use a more concise phrase to refer to a specific topic or issue.

5. "We regret to inform you" → "Unfortunately" or "I'm sorry to say"

  Instead of using a lengthy expression, choose simpler words to deliver disappointing news.

Remember, it is important to maintain a professional tone while also ensuring that your message is clear and easy to understand. Using simpler alternatives can help improve the readability of your business letters and written communications while still maintaining a polite and professional tone.

For more such questions on letters,click on

https://brainly.com/question/18319498

#SPJ8

________ group is used to select font styles. ​

Answers

Answer:

The font group............. ...

Our tests will run your program with input 2, then run again with input 5. Your program should work for any input, though.

Write code that outputs variable numDays. End with a newline

Answers

Answer:

In Python:

numDays = int(input("Days: "))

print("Number of days: "+str(numDays)+"\n")

Explanation:

The program was written in Python and the explanation is as follows;

First, get the input for the number of days from the user

numDays = int(input("Days: "))

Next, print string "Number of days: " followed by the number input from the user and then newline

print("Number of days: "+str(numDays)+"\n")

The character \n represents new line

what new technology led to the chaos that spurred the establishment of the federal communications commission?

Answers

Answer:

The digital read Harry quaant

Drag the tiles to the correct boxes to complete the pairs.

James is approachable
arrow --->
James is a good facilitator --->

James is confident --->

James is resourceful --->

Answers

Answer: James is all of the above

Explanation:

What technology is used to make telephone calls over the internet possible

Answers

Answer:

Voice Over Internet Protocol (VOIP) is the technology that enables telephone communication over the internet.

Explanation:

VOIP converts audio into digital signals that travel across the internet.

Select the correct answer from each drop-down menu.

Select the correct option to complete the algorithm that generates the first 100 even numbers (even numbers are divisible by 2)?

Select the correct answer from each drop-down menu.Select the correct option to complete the algorithm
Select the correct answer from each drop-down menu.Select the correct option to complete the algorithm

Answers

The correct option to complete the algorithm that generates the first 100 even numbers (even numbers are divisible by 2) include the following:

3. if x is less than or equal to 100, then go to step 4, else go to step 7.

4. if x is divisible by 2, then display x.

What is an algorithm?

In Computer technology, an algorithm can be defined as a standard formula (procedures) which is made up of a set of finite steps and instructions that are executed on a computer system, in order to enable a software proffer a solution to a particular problem under appropriate conditions.

Additionally, the three (3) main traits of an algorithm include the following:

An input.Logical steps.An output.

Based on the given algorithm for the first 100 even numbers (even numbers are divisible by 2), the missing steps should be completed with the information provided above.

Read more on algorithm here: brainly.com/question/24793921

#SPJ1

Create a query that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan. Show in the query results only the sum of the balance due, grouped by PaymentPian. Name the summation column Balances. Run the query, resize all columns in the datasheet to their best fit, save the query as TotaiBalancesByPian, and then close it.

Answers

A query has been created that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan.

In order to list the total outstanding balances for students on a payment plan and for those students that are not on a payment plan, a query must be created in the database management system. Below are the steps that need to be followed in order to achieve the required output:

Open the Microsoft Access and select the desired database. Go to the create tab and select the Query Design option.A new window named Show Table will appear.

From the window select the tables that need to be used in the query, here Student and PaymentPlan tables are selected.Select the desired fields from each table, here we need StudentID, PaymentPlan, and BalanceDue from the Student table and StudentID, PaymentPlan from PaymentPlan table.Drag and drop the desired fields to the Query Design grid.

Now comes the main part of the query that is grouping. Here we need to group the total outstanding balances of students who are on a payment plan and who are not on a payment plan. We will group the data by PaymentPlan field.

The query design grid should look like this:

Now, to show the query results only the sum of the balance due, grouped by PaymentPlan, a new column Balances needs to be created. In the field row, enter Balances:

Sum([BalanceDue]). It will calculate the sum of all balance dues and rename it as Balances. Save the query by the name TotalBalancesByPlan.Close the query design window. The final query window should look like this:

The above image shows that the balance due for Payment Plan A is $19,214.10, while for Payment Plan B it is $9,150.50.

Now, in order to resize all columns in the datasheet to their best fit, select the Home tab and go to the Formatting group. From here select the AutoFit Column Width option.

The final output should look like this:

Thus, a query has been created that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan.

For more such questions on query, click on:

https://brainly.com/question/30622425

#SPJ8

0.6 tenths of an hour would be how many minutes?

Answers

Answer: 3.6 minutes

Explanation:

1. What is virtual memory?
The use of non-volatile storage, such as disk to store processes or data from physical memory
A part of physical memory that's used for virtualisation
Some part of physical memory that a process though it had been allocated in the past
O Future physical memory that a process could be allocated

Answers

Answer:

The use of non-volatile storage, such as disk to store processes or data from physical memory.

Explanation:

Virtual memory is used by operating systems in order to allow the execution of processes that are larger than the available physical memory by using disk space as an extension of the physical memory. Note that virtual memory is far slower than physical memory.

advantage of using computer​

Answers

Answer:

What are the advantages of using a computer?

Although there are disadvantages to using a computer, we believe the advantages greatly outweigh the disadvantages (although we may be biased). Below is a list of the main advantages and benefits you'll get and society gets from using a computer.

Increase your productivityComputers increase your productivity and, with a good understanding of the software running on them, you become more productive at everything you do. For example, once you have a basic understanding of using a word processor, you can create, store, edit, share, and print documents and letters. Each of these things was either impossible or slower with all pre-existing technologies.

Connects you to the InternetConnecting a computer to the Internet is what unlocks the full potential of a computer. Once connected, your choices and available options are almost limitless. Many of the benefits listed on this page are with a computer connected to the Internet.

Can make you money?When connected to the Internet, a computer could help you make money many different ways. For example, it's cheaper to create and run an online store than having a physical store. Also, once online, your store or product has a global audience and you could sell to anyone in the world.Save timeToday, there are many services that help save you time. Several examples are listed below.

Using a site like Amazon, you can find many of the same products you would find at a store for the same price or cheaper. You can also have those items shipped to your door without having to leave your home.

You could use an online banking site to view your bank balance and pay bills.

If your favorite restaurant has a website, you can order take out without having to wait in line.

You can view online traffic cameras and maps with traffic information to find the quickest route.

You need to migrate an on-premises SQL Server database to Azure. The solution must include support for SQL Server Agent.

Which Azure SQL architecture should you recommend?

Select only one answer.

Azure SQL Database with the General Purpose service tier

Azure SQL Database with the Business Critical service tier

Azure SQL Managed Instance with the General Purpose service tier

Azure SQL Database with the Hyperscale service tier

Answers

The recommended architecture would be the Azure SQL Managed Instance with the General Purpose service tier.

Why this?

Azure SQL Managed Instance is a fully managed SQL Server instance hosted in Azure that provides the compatibility and agility of an instance with the full control and management options of a traditional SQL Server on-premises deployment.

Azure SQL Managed Instance supports SQL Server Agent, which is important for scheduling and automating administrative tasks and maintenance operations.

This would be the best option for the needed migration of dB.

Read more about SQL server here:

https://brainly.com/question/5385952

#SPJ1

Jack is part of the software quality assurance team in a company. Which activity should Jack perform as a part of software quality assurance?
A.
billing
B.
recruiting
C.
testing
D.
installing
E.
accounting

Answers

Answer:

C - testing

Explanation:

quality assurance is another name for verifying something. so when you verify software, you test the software.

What can be viewed in the Tasks folder? Check all that apply

Answers

Answer: task details; appointments; to do list

Explanation:

Task folders, simply allows an individual organize their tasks in a logical manner. It performs an identical function just like a file directory.

Folders can be created in the root folder. Once can also create them as subfolder in the other files. The task details, appointments and the to do list can be viewed in the task folder.

Considering the following part of the database to keep track of students and their marks for the courses that they follow.

Student(sid, sname, year)

Registered(sid, cid, mark, grade)

Course(cid, cname, no_credit, deptid)

Which of the following sequence of operations would list the names of students who have not registered for any course?

Answers

To list the names of students who have not registered for any course, we can use the following sequence of operations:

Retrieve all student IDs (sid) from the Student table.Retrieve all student IDs (sid) from the Registered table.Perform a LEFT JOIN between the two sets of student IDs, filtering out the matching records.Retrieve the names (sname) of the students from the resulting set.

How can we list the names of students who have not registered for any course?

To obtain the names of students who have not registered for any course, we need to compare the student IDs between the Student and Registered tables.

By performing a LEFT JOIN and filtering out the matching records, we will be left with the students who have not registered for any course. Finally, we can retrieve their names from the resulting set to list them.

Read more about sequence of operations

brainly.com/question/550188

#SPJ1

Construct a histogram and stats for November - December 2020 and compare this to those from November - December 2021 in a markdown cell below the histogram and statistics. time1 = ... # Seconds since epoch time2 = .. # Seconds since epoch Late2020 = .. Late2020

Answers

Histograms are commonly used in data analysis to visualize the distribution of a dataset.

What is a Histogram?

A histogram is a graphical representation of the distribution of a set of numerical data. It is a bar graph-like structure that displays the frequency of data values within specific intervals, which are called bins or classes.

The height of each bar represents the frequency of data values within that bin.

They allow us to quickly see the shape of the distribution, including the center, spread, and any outliers or gaps in the data.

They are especially useful for large datasets, as they can easily condense a large amount of data into a single, easy-to-understand visual representation.


P.S: Your question is incomplete as you did not provide a set of values, so a general overview about histogram is given above.

Read more about histograms here:

https://brainly.com/question/2962546

#SPJ1

Which of the following seeks to understand every user and how they interact with technology to make these interactions better?

UID
HCI
HHC
ICC

Answers

Answer:

HCI

Explanation:

Human-computer interaction (HCI) is a design field that focuses on the interfaces between people and computers.

Describe producing any four (4) methods output. o​

Answers

Outputs are final products or services that are given to the client. These outputs come from the processes that are used to transform the inputs into a business.

Thus, In other words, the output method counts the accomplishments. An entity must first estimate how many outputs will be required to fulfill the contract before implementing the output method.

The entity then monitors the development of the contract by comparing the total estimated outputs required to fulfill the performance obligation with the outputs that have already been produced and Bussiness.

Quantifying outputs can be done in a variety of ways and is easily adaptable to a contract. Examples of production measures are finished tables, units delivered, homes built, or miles of track constructed and outputs.

Thus, Outputs are final products or services that are given to the client. These outputs come from the processes that are used to transform the inputs into a business.

Learn more about Bussiness, refer to the link:

https://brainly.com/question/30762888

#SPJ1

Get the user to enter some text and print it out in reverse order.

Answers

Answer:

strrev in c/c++

Explanation:

The feature, located on the Ribbon, allow you to quickly search for commands or features.

Answers

MS Office's Quick Access Toolbar: No matter which tab is selected, the Quick Access Toolbar, which is located directly above the Ribbon, gives you access to basic actions. It displays the Save, Undo, and Redo commands by default, but you can add other commands as necessary.

What is Quick Access Toolbar?The Quick Access Toolbar is always visible on the far left of the File Explorer title bar by default. Look at the top of a File Explorer window that is open in Windows 10. In the upper-left corner, you can see the Quick Access Toolbar in all of its understated beauty. Although you can simply display the QAT below the Ribbon, it usually displays above the Ribbon by default. It may need to be enabled if you can't see it. Go to File - Options - Quick Access Toolbar in any Office suite program. Nevertheless, Windows 10 and Windows 11 both offer an easier method known as Quick Access. The Quick Access feature is immediately visible in the left sidebar after starting File Explorer.

To learn more about Quick Access Toolbar, refer to:

https://brainly.com/question/13523749

TRUE/FALSE. a user working from a different location from yours is experiencing an issue with an application on their system. to diagnose and resolve the issue, you need to be able to see the application while it is in use on the user's system.

Answers

A server running Windows Server 2019, Windows Server 2016, or Windows Server 2012 R2 for hosting sync shares with user files. A volume formatted with the NTFS file system for storing user files.

What is the preferred method to configure clients to use work folders?The option that can be used to help diagnose and fix network connection problems is System utilities.You must be a member of the Administrators group or the Backup Operators group on the local computer to back up or restore data.There are several ways to configure clients for accessing Work Folders. Automatic discovery is the most preferred method because it supports devices that are not domain joined. Automatic discovery of the Work Folders URL is based on the email address of the user.Incremental backups only archive files that have changed since the last backup of any kind was performed. Differential backups will archive any files that have been changed since the last full backup.A system restore point is primarily used for OS files and settings. It saves Windows system files and drivers. This will help in the event of a bad Windows update or system corruption. It also saves executable application data.

To learn more about application system refer to:

https://brainly.com/question/14983884

#SPJ4

Write a static method called split that takes an ArrayList of integer values as a parameter and that replaces each value in the list with a pair of values, each half the original. If a number in the original list is odd, then the first number in the new pair should be one higher than the second so that the sum equals the original number. For example, if a variable called list stores this sequence of values:

Answers

Answer:

The method is as follows:

public static void split(ArrayList<Integer> mylist) {

   System.out.print("Before Split: ");

   for (int elem = 0; elem < mylist.size(); elem++) { System.out.print(mylist.get(elem) + ", ");    }

   System.out.println();

   for (int elem = 0; elem < mylist.size(); elem+=2) {

       int val = mylist.get(elem);

       int right = val / 2;

       int left = right;

       if (val % 2 != 0) {            left++;        }

       mylist.add(elem, left);

       mylist.set(elem + 1, right);    }        

   System.out.print("After Split: ");

   for (int elem = 0; elem < mylist.size(); elem++) { System.out.print(mylist.get(elem) + ", ");    }

}

Explanation:

This declares the method

public static void split(ArrayList<Integer> mylist) {

This prints the arraylist before split

   System.out.print("Before Split: ");

   for (int elem = 0; elem < mylist.size(); elem++) { System.out.print(mylist.get(elem) + ", ");    }

   System.out.println();

This iterates through the list

   for (int elem = 0; elem < mylist.size(); elem+=2) {

This gets the current list element

       int val = mylist.get(elem);

This gets the right and left element

       int right = val / 2;

       int left = right;

If the list element is odd, this increases the list element by 1

       if (val % 2 != 0) {            left++;        }

This adds the two numbers to the list

       mylist.add(elem, left);

       mylist.set(elem + 1, right);    }      

This prints the arraylist after split

   System.out.print("After Split: ");

   for (int elem = 0; elem < mylist.size(); elem++) { System.out.print(mylist.get(elem) + ", ");    }

}

Which function calls would provide the most helpful test of this function? Remember: With tests, you are attempting to figure out all the possible ways the function could be broken.
function findMin(num1, num2){
if(num1 < num2){
return num1;
} else {
return num2;
}
}
A. findMin(-1, 0)
findMin(2,4)
findMin(5,10)
B. findMin(5,3)
findMin(7,2)
findMin(5,1)
C. findMin(1,1)
findMin(-2,2)
findMin(0,3)
D. findMin(-1,1)
findMin(1,-1)
findMin(1,1)

Answers

Answer:

D

Explanation:

Based on the information given, the correct option will be:

D. findMin(-1,1)

findMin(1,-1)

findMin(1,1)

It should be noted that based on the information given, the correct option is D because it contains a duplicate set of numbers.

In this case, "1,1", would be vital in breaking the algorithm and require a bug fix from the developer. This then makes it the most helpful.

In conclusion, the correct option is D.

Learn more coding on:

https://brainly.com/question/22654163

Computing for engineers

Computing for engineers
Computing for engineers

Answers

The C++ code that implements the above program is given below.

How to explain the program

#include <iostream>

#include <cmath>

using namespace std;

int main() {

   double L, E, I, P, W, a, b, c, max_shear, max_bending, max_deflection;

   // Calculate I

   double height, width;

   cout << "Enter the height of the beam cross-section: ";

   cin >> height;

   cout << "Enter the width of the beam cross-section: ";

   cin >> width;

   I = (1.0/12.0)*height*pow(width, 3);

   // Loop for user input

   char input;

   while (cin) {

       cout << "Select an option:\n"

            << "  p: Beam with a point load\n"

            << "  w: Beam with distributed load\n"

            << "  e: Exit the program\n";

       cin >> input;

       if (input == 'p' || input == 'P') {

           cout << "Enter the length of the beam: ";

           cin >> L;

           cout << "Enter the modulus of elasticity of the beam material: ";

           cin >> E;

           cout << "Enter the magnitude of the point load: ";

           cin >> P;

           cout << "Enter the distance from the left end of the beam to the point load: ";

           cin >> a;

           // Calculate max shear,

Learn more about program on;

https://brainly.com/question/26134656

#SPJ1

Other Questions
equation of a linefind an equation for L a company has a beta of 4.51 if the market return is expected to be 14.10 percent and the risk free rate is 7.05 percent what is the companys risk premium grants strategy of maintaining the initiative against robert e. lee, thus suffering high casualties in the army of the potomac, earned him a reputation of the "butcher of men." someone help please. i need to turn this in tomorrow. Question is in the picture! which values should you plot to show a linear relationship? A. "Day" on the x-axis and "number of seeds" on the y-axis.B. "Day" on the x-axis and "Log(seeds)" on the y-axis.C. "Number of seeds" on the x-axis and "Log(seeds)" on the y-axis.D. "Log(seeds)" on the x-axis and "Day" on the y-axis. Mohammed is interested in purchasing a house worth 51,750 OMR. Mohammed goes to Sohar Bank (an Islamic bank) for the purchase of the property and puts down 40% of the price as a down payment. Both parties determined the rental value for the house as 350 OMR per month as the rental value. Based on the rental value and the financing period, the financial institution determined fixed monthly payments as 4,000, which Mohammed would have to make to own the house. Prepare payment table for this contract. Find the beginning bank ownership. Find the total rent paid. Find the total extra payments. why are the beta-pleated multimers of prp potentially pathogenic? why are the beta-pleated multimers of prp potentially pathogenic? the multimers are more stable and resistant to protease. they repress the immune system. they are found on the surface of immune cells, resulting in damage to the immune system. they are not detected by other organisms. What is the relationship between agriculture and health Discuss the differences between short run VS long run Firm Supply in competitive market competition, use graphs to illustrate your answers. list the names (or rock types) and ages of rocks resting directly below the chinle formation in each of the stratigraphic sections. Find the Lateral Area, Total Surface Area and Volume. Round your answer to two decimal places. The fog blanketed the lake in the early morning. What does this sentence mean in teams of Figurative Language. Please answer quick. i need help speaking Spanish PLZ write a fictional but realistic journal entry for one day in the life of Equiano after his arrival and colonial Virginia. what is the meaning of Monty Classify each pair of numbered angles.Drag and drop the descriptions into the boxes to correctly classify each pair of numbered angles. Each description may be used more than once.Linear pair, Vertical, Adjacent, None of These. and please don't ask me a question by "answering" it ;-; ty and have a nice day! :) C25T24AcWhat is the Tangent of angle T As a plant cell what extra layer must be formed in the onion to separate the daughter cells? Help me please !!!!!!!!! Amelia left her house at time zero and drove to the store, which is 4 blocks away, at a speed of 2 blocks per minute. Then she stopped and went into the store for 2 minutes. From there, she drove in the same direction at a speed of 7 blocks per minute until she got to the bank, which is 14 blocks away from the store. She stopped at the bank for 3 minutes. Then she drove home at a speed of 6 blocks every minute. Make a graph of showing the number of blocks away from home that Amelia is x minutes after she leaves her house, until she gets back home.