Why is it unethical to share copyrighted files withyour friends ?
(A) It is notunethical, because it is legal.
(B) It is unethical because thefiles arebeing given for free.
(C) Sharingcopyrighted files without permission breaks copyright laws.
(D) It is notunethical becausethe filesarebeing given for free.
(E) It is notunethical-anyonecan access acomputer

1 Answer

Answer :

Sharingcopyrighted files without permission breaks copyright laws

Related questions

Description : Why is it unethical to share copyrighted files with your friends: a) It is not unethical because it is legal b) It is unethical because the files are being given for free c) Sharing copyrighted files ... because the files are being given for free e) It is not unethical - anyone can access a computer

Last Answer : c) Sharing copyrighted files without permission breaks copyright laws

Description : The process of transferring files from acomputer on the Internet to your computer is called– (A) downloading (B) uploading (C) FTP (D) JPEC (E) downsizing

Last Answer : downloading

Description : Communication between acomputer and a keyboardinvolves______________ transmission. A) simplex B) half-duplex C) full-duplex D) automatic

Last Answer : simplex

Description : Are your own personal photos and artwork automatically copyrighted upon creation even though you may not have formally gone through the copyright process?

Last Answer : Heh. Well 97% of my photos are from other people (except my Fluther Profile Pic as of late) and I think they look cool but nobody's had a problem so I would discuss it with the person if ... aren't willing report them under the terms that they are invading your privacy' or some such phrasing.

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : When you purchase copyrighted software, what actually are you paying for? a. The cost of the CDs, manuals, and development of the software b. The cost of the CDs, manuals, and a share of the cost of the software development c. A share of the cost of software development d. All of the above

Last Answer : d. All of the above

Description : Which term is commonly used for copyrighted software given away free by its author? A. Freeware B. Shareware C. Open Source Software D. Public Domain Software

Last Answer : A. Freeware

Description : When management refuses to disclose in the financial statements noncompliance to laws and regulations which are identified by the independent auditor, the CPA may be charged with unethical conduct for ... and regulations during the prior audits. d. Reporting these activities to the audit committee.

Last Answer : Issuing a disclaimer of opinion

Description : Is it legal for anyone to close a lane or lanes on a City street without permission?

Last Answer : The government or presiding authority may close a lane or roadfor any reason they wish.A private citizen does not have the ability to close alane/road.

Description : Distributed processing involves a) solving computer component problems from a different computer b) solving computing problems by breaking them into smaller parts that are separately processed by different ... ) allowing users to access network resources away from the office e) None of these

Last Answer : b) solving computing problems by breaking them into smaller parts that are separately processed by different computers

Description : What is an unethical, yet legal way to get rich?

Last Answer : Become a television pastor preaching the prosperity gospel.

Description : If my friends just started a new website, and I want to help them out, is it unethical to click on the weblinked ads if I'm minimally interested in what they're selling?

Last Answer : I don't see why not.

Description : Do copyright laws protect professional photos from being altered?

Last Answer : Slapped a COPYRIGHT right across the picture!

Description : If you use designer home decor items for 'inspiration', are you breaking copyright laws?

Last Answer : answer:Strange little glitch just happened, and I lost the response that I already typed out. I don't know the answer for sure, but I'm sure it's only a matter of time before someone comes along that ... shelves of stores. I doubt that you would run into any issues.. but again, I'm only guessing.

Description : Does anyone worry about copyright laws?

Last Answer : I worry that they are being misused to benefit the Disney Company, which would have lost the rights to its creatures by now if it hadn’t bribed Congress to intervene.

Description : What would happen if all intellectual property (copyright, patent, trademark) laws were to be abolished?

Last Answer : Studio recordings and video would vanish overnight. There are large up-front costs involved with record production, and without copyright protection, it's difficult to impossible to recoup those costs. Musicians ... cheaper to print-on-demand rather than buying. This is still a few years off yet.

Description : If I post a photo of a candy bar on my website, with brand and other text clearly legible, would I be violating any copyright laws?

Last Answer : You’re fine. This would fall under “fair use” – showing a copyrighted product in an editorial context.

Description : Don't people who make videos about different movies or games break copyright laws ? Tell the details ?

Last Answer : Everyone has a desire for something or other. Yes. They make videos on the game by re-acting that money, but if they make J videos, it is wrong if it has a bad effect on any subject. And that is breaking the law.

Description : Basic Audio Copyright Laws?

Last Answer : Audio copyright laws are some of the most interesting in the world of general copyright law because there are some things about them that are different when compared to other types of law. First off, ... used in the music world to create more music. People will take fifteen seconds of many differen

Description : A college student desires to get elected to the municipal council of his city. The validity of his nomination would depend on the important condition, among others, that? (1) He obtains permission from ... the voter's list. (4) He files a declaration owing allegiance to the constitution of India.

Last Answer : (3) His name figures in the voter's list. Explanation: The validity of nomination of a person to get elected to the municipal council would depend on the condition that his name should be figured in the voter's list.

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : You can check out your couple's Instagram or fbja. Leave your phone free or plug it in.

Last Answer : I'll handle her email for administration. Anyway, I trust you don't have to pay attention to your Facebook page ...

Description : Am I responsible for the dentist bill if my son accidentally causes an injury to his friend's tooth while playing with an air soft gun? The other boy had permission to play and did not have a the proper mouth guard.

Last Answer : I think it might depend on 1. whose supervision they were under 2. if the boy was told to wear a mouth guard 3. the parent/guardian of that child new that their child was not equipped with the proper protection and still allowed it.

Description : Is it legal for an employer to allow only lunch after five hours and no other breaks at all?

Last Answer : Employers are required to provide break periods of at least 30 minutes for minors ages 14 through 17 who work five or more consecutive hours. Employers are not required to give breaks for employees ... and it lasts more than 20 minutes. A collective bargaining agreement may also govern this issue.

Description : In SQL, the CREATE TABLESPACE isused A. to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace B. to createa database trigger C. to add/rename data files, to change storage D. All of theabove E. None of the above

Last Answer : to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace

Description : Report generatorsare usedto A. store data input bya user B. retrieve information from files C. answer queries D. both (b)and (c) E. None of the above

Last Answer : both (b)and (c)

Description : There arecertain packages that allow people to define data items, place these items in particular records, combine therecords into designated files and then manipulate and retrieve the storeddata. What arethey ... (DBMS) C. Batch processingsystem D. Data communication package E. None of the above

Last Answer : Database management system (DBMS)

Description : You cankeep your personal files / folders in– (A) My folder (B) My Documents (C) My Files (D) My Text (E) None of these

Last Answer : My Documents

Description : HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... used to monitor computers D. a protocol that handles error andcontrol messages E. None of the above

Last Answer : a protocol used to monitor computers

Description : Whoever, being employed to carry or deliver any mail bag or any postal article in course of transmission by post, voluntarily withdraws from the duties of his office without permission or without having given one ... with fine which may extend to fifty rupees, or with both. d) None of the above

Last Answer : c) Punishable with imprisonment which may extend to one month, or with fine which may extend to fifty rupees, or with both.

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Did you ever quit a job or refuse to go along with something because it was unethical?

Last Answer : I told Tony Soprano to keep his dirty job.

Description : How are people able to sell copyrighted images online?

Last Answer : I don’t think you can copyright your face but it is illegal to sell a copyrighted image without permission. But, as with many things, unless you’re caught, you can get away with it.

Description : Have you ever heard of robots that scan websites looking for copyrighted images?

Last Answer : I would take anything posted on a FB group with a very large grain of salt. Bu there are webcrawlers that index images from web sites, that is how the images page from a Google search is built.

Description : What copyrighted work is the most likely to be taken off of Youtube?

Last Answer : Try a top-ten song owned by SONY.

Description : If someone wrote a book or something that used names copyrighted or trademarked by someone else, could they get out of trouble by saying 'insertnameshere are registered trademarks of insertownerhere'?

Last Answer : answer:Names and titles are not copyrightable. Names can be trademarked. You can use (through fair use) insertnameshere are registered trademarks of insertownerhere'. For example if you were doing softare ... . But you could probably not use a trademark in the title of a novel without permission.

Description : Can someone tell me if this is copyrighted?

Last Answer : Based on the website, that image is from WWI, which means it originated sometime between 1914 to 1918. The youngest this photo could be is 92 years old, which means it's copyright period has expired. In ... has an image use policy. However, because of the photo's age, it seems pretty safe to use.

Description : Is the name "Pet Rock" copyrighted?

Last Answer : answer:Copyright is not the appropriate protection. It would be trademarked. The answer to that would be that you need to search (or have a trademark attorney do it for you) the trademark database. ... of whether it was trademarked. IDahl made millions with the product so I suspect that it was.

Description : Making illegal copies of copyrighted software is called …………………. (a) Software piracy -Technology

Last Answer : (a) Software piracy refers to making illegal copies of copyrighted software.

Description : I'm writing a book and its divided based on personalities. But I heard from a friend that Divergent, is also divided like that. Can I be sued, or copyrighted. Should I start over?

Last Answer : I don't really think so. But you should check with an expert.

Description : Is the "Happy Birthday" song still copyrighted?

Last Answer : I always thought it was never in TV shows or anything because it cost a whole lot to use, but I’ve been hearing it more recently—what gives?

Description : A brand is BEST defined as a A)registered design or symbol that is displayed on the product. B)related group of words that describe the product. C)name, symbol, design, or combination of these that identifies a seller's products. D)copyrighted word(s) that give the manufacturer exclusive ownership

Last Answer : C)name, symbol, design, or combination of these that identifies a seller's products.

Description : What is the unauthorized use, duplication, distribution or sale of copyrighted software? a. Fair Use Doctrine b. Pirated software c. Counterfeit software d. Privacy

Last Answer : b. Pirated software

Description : A semi-conductor is damaged & behaves like a conductor, on passing a strong electric current through it, because it heats up the crystals & breaks the covalent bonds resulting in __________ electrons. (A) Lack of free (B) Excess of (C) Decrease in (D) None of these

Last Answer : (B) Excess of

Description : Which type of files cannot be navigated using ClipArt browser? A. AVI B. BMP C. WAV D. MP3

Last Answer : MP3

Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP B) C) SNMP C) SMTP D) D) Rpe

Last Answer : A) FTP