Alex wrote a science fiction story about half-living, half-robot creatures in
another galaxy. He wanted to copyright the creature idea for later sequels but
was denied. What element was missing?
O A. Creativity
OB. Fixed form
O C. Interest
OD. Originality

Answers

Answer 1

Answer:

im not sure about this one but im pretty sure its d since this is not a original idea at all their are like tons of cyborn alien thing on their and this would not be original

Hope This Helps!!!


Related Questions

you have been using snmp on your network for monitoring and management. you are concerned about the security of this configuration. what should you do?

Answers

The thing that should be done is to implement version 3 of SNMP.

How to depict the information?

In this situation, the person has been using snmp on your network for monitoring and management. you are concerned about the security of this configuration.

Therefore, since the person is concerned about the security of this configuration, the thing that should be done is to implement version 3 of SNMP.

Learn more about configuration on:

brainly.com/question/26084288

#SPJ12

when scrum team members meet and collaborate with each other to find the best way to build and deliver the software to the customer, which of the following agile values is being practiced?

Answers

The agile values is being practiced is Individuals and interactions over processes and tools.

What is individuals and interactions over processes and tools?

This is known to be a first value that is seen in the Agile Manifesto as it is “Individuals and interactions over processes and tools.”

Note that it place Value of people more highly instead of processes or tools and as such, The agile values is being practiced is Individuals and interactions over processes and tools.

Learn more about  scrum team  from

https://brainly.com/question/4763588

#SPJ11

When you use transact-sql, you can store procedural code in:

Answers

When you use transact-sql, you can store procedural code in stored procedure, scriptsz or user defined functions.

What is a procedural code?

It should be noted that a procedural code is ten code that directly instruct a device on how to finish a task.

In this case, when you use transact-sql, you can store procedural code in stored procedure, scripts, or user defined functions.

Learn more about procedural code on:

brainly.com/question/18265814

#SPJ12

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

Answers

A(n) access point is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

What is an access point?

An access point is known to be a kind of device that makes a wireless local area network, or WLAN, and it is often done in an office or big  building.

Therefore, A(n) access point is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

Learn more about access point from

https://brainly.com/question/14306861

#SPJ12

The _____ command defines a default value for a column when no value is given

Answers

The DEFAULT command defines a default value for a column when no value is given

How to determine the command?

In SQL and other related query languages, a column can be set to have a default value.

This is done using the constraint:

default("some text here")

Hence, the DEFAULT command defines a default value for a column when no value is given

Read more about sql at:

https://brainly.com/question/25694408

#SPJ12

Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an example for.

Answers

An example of a security misconfiguration is the absence of adequate security hardening throughout the application stack or incorrectly set permissions.

What are security misconfigurations?

Security measures that are incorrectly set or left unsecured are known as security misconfigurations,

They, put your systems and data at risk. Basically, a misconfiguration might result from any poorly described configuration changes, default settings, or a technical problem with any component in your endpoints.

Cross-Origin resource sharing (CORS), and verbose error messages are a few instances of security misconfigurations.

Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an example of security misconfigurations.

Hence, security misconfigurations are the correct answer.

To learn more about the security misconfigurations refer to:

https://brainly.com/question/14613247

#SPJ1

what is the size of the rc.conf file in bytes

Answers

Answer:

It is 281 bytes.

The size of the rc.conf file in bytes is known to be 281 bytes

What is rc conf file?

The rc. conf file  is known to be a kind of file that often specifies the vital  services that needs to be turn on or enabled in course of system startup.

Note that in the case above, The size of the rc.conf file in bytes is known to be 281 bytes.

Learn more about bytes from

https://brainly.com/question/6835146

#SPJ11

what are the tags in html. Write its syntax.

Answers

Answer:

HTML is using tags for its syntax. A tag is composed with special characters: <, > and /. They are interpreted by softwares to compose an HTML element.

Explanation:

There are generally two types of tag they are;

1. empty tahg

2. container tag

3. Describe how you would properly dispose of the following materials so that you do not damage the environment. Write on each topic below.
CRT monitors
Scanners
Batteries
Ink/Toner
Hard Drives

Answers

Alkaline and zinc-carbon batteries may be securely disposed of in your domestic garbage in the majority of areas.

What is disposing of?

Disposing of is the process of completely destroying any material completely.

It's critical to adhere to established practices for electronic device disposal, in addition, to securely protecting sensitive information on electronic devices.

The most effective method of preventing outsiders from obtaining your information is to physically destroy a gadget.

Your computer disc and other gadgets can be destroyed using specialized services that can burn, melt, dissolve, or pulverize them.

These techniques of sanitization are used in authorized incineration facilities or outsourced metal destruction facilities, and they are intended to totally destroy the media.

If you don't want to utilize a service, you may break your hard drive yourself by hammering nails or drilling holes in it.

Hence batteries may be securely disposed of in your domestic garbage in the majority of areas.  

To learn more about the disposing of refer ;

https://brainly.com/question/15709251

#SPJ1

what is computer generation​

Answers

Answer:

Generation in computer terminology is a change in technology a computer is/was being used which includes hardware and software to make of an entire computer system .

What does a terminal access controller access control system plus (tacacs ) keep track of? check all that apply

Answers

The thing that the terminal access controller access control system plus keep track of is the log admin access to each device and the changes that are made.

Why is the control system important?

The control system is important as it's an authentication protocol used for remote communication.

Here, the terminal access controller access control system plus keep track of the log admin access to each device and the changes that are made.

Learn more about control system on:

brainly.com/question/25930304

#SPJ12

to protect a windows 10 system, you've configured system restore to automatically protect your system using restore points. will this adequately protect the user data on the system?

Answers

This can't adequately protect the user data on the system as one needs to enable file history.

How to depict the information?

In order to protect a windows 10 system, one will need to configure the system restore to automatically protect your system using restore points.

Despite this, this can't adequately protect the user data on the system as one needs to enable file history.

Learn more about windows on:

brainly.com/question/25243683

#SPJ12

Due to a fire at ABC Software Solutions, all
documentation for a product is destroyed just before it is
delivered. What is the impact of the resulting lack of
documentation?

Answers

Answer:

chaos among people who worked in the company.

In a job-order costing system, manufacturing overhead applied is recorded as a debit to:

Answers

In a job-order costing system, manufacturing overhead applied is recorded as a debit to Work in Process inventory.

What is Manufacturing overhead (MOH) cost?

This is known to be  the sum of all the indirect costs which is said to be often incurred while creating a product.

Note that in the case above, In a job-order costing system, manufacturing overhead applied is recorded as a debit to Work in Process inventory.

Learn more about costing system from

https://brainly.com/question/24516871

#SPJ12

What might you expect to find out about people who are described as credit risks?

Answers

What might you expect to find out about people who are described as credit risks? They have a history of not making their payments on time. Which is a long-term consequence of making late payments on your bills? It will be harder to secure a new loan at a low rate.

what is your first step in developing the database?

Answers

The first step in developing a database is simply to have a conversation (talk) to the employees or end users who will be using the database.

What is a database?

A database can be defined as an organized and structured collection of data that are stored on a computer system as a backup and are usually accessed electronically.

As a general rule, having a conversation (talk) to the employees or end users who will be using the database is the first step in developing a database.

Read more on database here: brainly.com/question/13179611

#SPJ12

is CLI and DOS the same ??​

Answers

Yes they are the same
Yes they are the same

30 POINTS FOT THE ANSWER FAST
Choose an industry and consider how web design has made an impact on that industry. What specific skills do you think are required to do web design for this industry? What do you think the future holds for web design in this industry?

Answers

The industry I chose is the fashion industry and how web design has made an impact on that industry are:

It often impact the visual style of cloths.It has helped in making of nice and good cloth design. It aid in design and visual effect of its product.

What is the impact of web design?

Web design is known to be a key  parts of Internet marketing strategy as it helps in digital customer experience in a lot of ways.

The skill needed are:

Visual designThe use of Design software. HTML. JavaScript, etc.

Therefore, The industry I chose is the fashion industry and how web design has made an impact on that industry are:

It often impact the visual style of cloths.It has helped in making of nice and good cloth design. It aid in design and visual effect of its product.

Learn more about  fashion industry  from

https://brainly.com/question/27318787

#SPJ1

Routing and remote access services allow users to connect to private networks using or:.

Answers

Answer:

Users can connect to a remote access server through a dial-up connection or a virtual private network (VPN) connection.

Explanation:

A dial-up connection requires both the server and the client computer to have a correctly configured modem. The client and the server connect over analog public telephone networks. To enhance the security of a dial-up connection, use data encryption, Windows logon and domain security, remote access policies and callback security.

Which of the following creates a security concern by using AutoRun to automatically launch malware?

Answers

Answer:

USB device

Explanation:

AutoRun automatically launches malicious software as soon as you insert a USB device

Restore points are created at regular intervals and just before you install software or hardware by what utility?

Answers

System Protection is a utility that create restore points at regular intervals and just before an end user installs a software or hardware.

What is System Protection?

System Protection can be defined as a utility that is designed and developed to create restore points on a computer system at regular intervals, especially before an end user installs a software or hardware.

This ultimately implies that, System Protection is a utility that create restore points at regular intervals and just before an end user installs a software or hardware.

Read more on System Protection here: https://brainly.com/question/13982988

#SPJ12

A Uniform Resource Locator (URL) is an Internet address that performs which task?

Answers

A Uniform Resource Locator (URL) is an Internet address of a website identifies the method by which an Internet resource (website) is accessed.

What is a website?

A website can be defined as a collective name which connote a series of webpages that are interconnected with the same domain name or Uniform Resource Locator (URL), so as to provide certain information to end users.

In Computer technology, a Uniform Resource Locator (URL) is an Internet address of a website identifies the method by which an Internet resource (website) should be accessed by end users.

Read more on a website here: https://brainly.com/question/26324021

#SPJ12

You are the network administrator for a small organization. recently, you contracted with an isp to connect your organization's network to the internet to provide users with internet access. since doing so, it has come to your attention that an intruder has invaded your network from the internet on three separate occasions. what type of network hardware should you implement to prevent this from happening again

Answers

The type of network hardware that you should to implement so as to prevent this from happening again is Firewall.

What is a Firewall?

A Firewall is known to be a kind of network security machine that helps to monitors and run through any incoming and outgoing network traffic through the use of firm's  formerly  set up security policies.

Note that, a firewall is made as a kind of the barrier and as such, The type of network hardware that you should to implement so as to prevent this from happening again is Firewall.

Learn more about network hardware from

https://brainly.com/question/12716039

#SPJ1

Marlene is updating her horizontally scaled Internet-facing web servers to remediate a critical bug. Her manager has agreed to operate under reduced computing capacity during the process but stipulates that there can be no downtime during the process. What upgrade approach should Marlene perform to meet these requirements

Answers

The inference is that the upgrade approach should Marlene perform to meet these requirements is rolling.

What is an inference?

An inference is the conclusion that can be deduced based on the information given.

In this case, the inference is that the upgrade approach should Marlene perform to meet these requirements is rolling. This will help in upgrading the web servers.

Learn more about inference on:

brainly.com/question/25280941

#SPJ12

Profitability, consumer relations, and competition are involved in what kinds of concerns in the design process?

Answers

Profitability, consumer relations, and competition are involved in Product Development and Commercialization.

What are the stages of product development?

The stages of the New Product Development act are:

Idea Generation. Screening. Concept Development. Product Development and Commercialization.

Note that Product development and commercialization is known to be the supply line management method that helps to give structure for creating and bringing in of  new products in line with customers and suppliers in the market.

Therefore, one can say that Profitability, consumer relations, and competition are involved in Product Development and Commercialization.

Learn more about Profitability from

https://brainly.com/question/24553900

#SPJ1

True or false. A plug-in card is always required to support pc sound

Answers

Answer:

False

Explanation:

The motherboard chipset frequently provides false sound functionality. A sound card is a computer expansion device that receives and sends audio. Software programs and device drivers are used to configure and operate sound cards. The input device used to obtain audio data is typically a microphone, while the output devices are typically speakers or headphones. The Sound Card translates incoming digital audio data into analog audio for playback by the speakers. In the opposite instance, the sound card may convert analog audio data from the microphone to digital data that can be saved on a computer and transformed using audio software.

A plug-in card is always required to support a personal computer (PC) sound: False.

What is a hardware?

A hardware refers to a physical component of computer system that can be seen, programmed, and touched by the end users such as:

MotherboardKeyboardSpeaker

In Computer technology, sound functions in all personal computers (PCs) are often provided by the motherboard chipset. Thus, a plug-in card is not required to support sound in a personal computer (PC).

Read more on hardware here: brainly.com/question/959479

#SPJ12

hexadecimal to denary gcse method

Answers

There are two ways to convert from hexadecimal to denary gcse method. They are:

Conversion from hex to denary via binary.The use of base 16 place-value columns.

How is the conversion done?

In Conversion from hex to denary via binary:

One has to Separate the hex digits to be able to know or find its equivalent in binary, and then the person will then put them back together.

Example - Find out the denary value of hex value 2D.

It will be:

2 = 0010

D = 1101

Put them them together and then you will have:

00101101

Which is known to be:

0 *128 + 0 * 64 + 1 *32 + 0 * 16 + 1 *8 + 1 *4 + 0 *2 + 1 *1

= 45 in denary form.

Learn more about hexadecimal from

https://brainly.com/question/11109762

#SPJ1

impact of science in the world ​

Answers

Answer:

scientific impact reflection that finding all publication has on science or on society

Explanation:

such impact can be short term or long term and it is important not be imprise 1 over the other to great extent

Write an expression that evaluates to true if and only if the value of the boolean variable workedovertime is true.

Answers

Answer:

import java.io.*;

public class WorkedOvertime

{

 public static void main (String[] args)

    {

  boolean workedovertime = false;

  if ( workedovertime )

   {

    System.out.println("Evaluates to True");

   }

   else

    {

    System.out.println("Evaluates to False");

    }

 }

}

Explanation:

This simple java program evaluates to true if and only if the value of the boolean variable workedovertime is true.

The government of Pakistan in collaboration with the government of China initiated (CPEC) project (China-Pakistan Economic Corridor). You are required to make a portfolio on CPEC project.

The portfolio must include:

(1) Inaugurations date.
(2) Countries involved (Beneficiaries).
(3) Route / Map.
(4) Length of the route.
(5) Security measures for the project.
(6) Potential benefits for Pakistan.
(7) Foreign threats to the project.
(8) Impact on employment for local population.

Answers

China and Pakistan are connected through the China-Pakistan Economic Corridor.Since 2013, Pakistan has been home to a number of infrastructure projects that are part of the China-Pakistan Economic Corridor (CPEC). By 2020, the value of CPEC projects will have increased to $62 billion from their initial estimate of $47 billion. By building modern transportation networks, many energy projects, and special economic zones, CPEC aims to quickly update Pakistan's necessary infrastructure and boost its economy.  When Chinese cargo was transferred overland to Gwadar Port on November 13, 2016, CPEC began to function in part, while some significant power projects were completed by the end of 2017.Under the auspices of CPEC, a massive network of roads and railroads will be constructed that will traverse the whole country of Pakistan. According to government estimates, inefficiencies in Pakistan's transportation system result in a loss of 3.55 percent of the nation's annual GDP. Under the CPEC, up-to-date transportation systems will be constructed to connect the seaports of Gwadar and Karachi with northern Pakistan as well as farther-flung locations in western China and Central Asia. As part of CPEC, a 1,100-kilometer road will be constructed between Karachi and Lahore, while the Karakoram Highway from Hasan Abdal to the Chinese border will undergo a comprehensive overhaul and reconstruction. By December 2019, the Karachi-Peshawar main railway line will also be improved, enabling trains to run at high to 160 km/h. The Southern Xinjiang Railway of China will eventually be connected to Pakistan's railway system in Kashgar. Subsidized concessionary loans will provide the estimated $11 billion needed to modernize transportation networks.

Learn more about China Pakistan here https://brainly.com/question/17737838

#SPJ10

Other Questions
In which business did Andrew Carnegie create a monopoly?the oil businessthe automobile businessthe telephone businessthe steel business Some people have their gall bladder surgically removed to the formation of gall stones. Describe the function of the gall bladder and explain how a gall bladder removal would have on their digestion. Divide.round to the nearest tenth .16.03220 Embulate the given function for f(8) f(x)=(x-5)2 f(8= Use the algebra tiles to model the equation 2x + 4 = 3x + (1). Then complete the sentences. To model 2x + 4, you need: Plato trigonometry is crazy adjustment disorder treatment medication How does the rhetorical appeal support Walker'spurpose? Which of thefollowing does NOTprotect vital organs?Week A. ribsB. femurC. skull Hich one of the substances is not transported by the human circulatory system?(1 point) a) water b) digested food c) carbon dioxide d) undigested food 5 PQ is a chord of length 8 cm of a circle of radius 5 cm. The tangents at P and Q intersect at a point T. the length TP in cm is: Ragan makes beaded jewelry. The graph below shows the number of beads on varying cord lengths.JewelryA graph has cord length (inches) on the x-axis and number of beads on the y-axis. A line goes through points (16, 48) and (24, 72).Which is the best estimate of the number of beads on a cord that is 16 inches long?584448 Chris opened up a new credit card and credit line with U.S bank. He is paying a 15% APR on all new purchases A. if he has a balance of 2,800 on his credit card, how much does he owe in interest to the bank next month? B. if he sends in a payment to U.S bank for $140, how much of that will go towards paying off his principle balance what are the zero of f(x)=x(x-8) What is the range of f(x) = 3x + 9? Can someone please teach me how to do this? You can please do like 2 questions and please explain exactly how you got the answers so I can do the rest myself. please Which type of market is the one in which a person buys stock in the fast-food company that makes their favorite breakfast sandwich?a. Product market b. Factor marketc. Financial market d.Closed market If 22% of high school students say they eat out 3 times a week, how many students of the 2346 students who attend WHS would you expect eat out 3 times a week? Discuss how the research in this article shows how new technology and experimental methods can lead to changes in theories. Are these phrases used to show uncertainty (u),speculate (s) or give opinions (o)?