COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Rudy is using 15 seconds of a copyrighted song for a school project. Which law gives her the right to do this?
A
Copyright
B
Public domain
C
Copyright infringement
D
Fair use
Explanation: 

Detailed explanation-1: -Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count.

Detailed explanation-2: -Identification and financial information like your Social security number (SSN), driver’s license number, bank account numbers, and passport number should never make it to a social media site. These can be used immediately for identity theft and more.

Detailed explanation-3: -What is one thing that James can do to be sure he is practicing cyber-safety? He should never disclose personal information.

Detailed explanation-4: -Which statement is true about mobile devices and your personal information? Mobile devices cannot be lost or stolen so your information is secure in them.

There is 1 question to complete.