FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Rudy is using 15 seconds of a copyrighted song for a school project. Which law gives her the right to do this?
A
Copyright infringement
B
Fair use
C
Copyright
D
Public domain
Explanation: 

Detailed explanation-1: -Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.

Detailed explanation-2: -What is one thing that James can do to be sure he is practicing cyber-safety? He should never disclose personal information.

Detailed explanation-3: -Why should Elsie be cautious about the messages and images she posts online? Because posts can exist forever.

Detailed explanation-4: -Which statement is true about mobile devices and your personal information? Mobile devices cannot be lost or stolen so your information is secure in them. Mobile devices must be protected because they contain private information about the owner.

There is 1 question to complete.