Software is sometimes illegally modified in order to disable ________ technologies such as copy protection and authenticity checks.
A. Turing
B. attribution
C. DRM
D. fair use
Answer: C
You might also like to view...
Consider a class that uses the following variables to implement an array-based stack:
``` String [] s = new String[100]; int top = -1; // Note top == -1 indicates stack is empty ``` a method that implements a void push(String x) operation can be written as A) if (top == s.length-1) throw new RuntimeException("Overflow"); top++; s[top] = x; B) if (top == s.length) throw new RuntimeException("Overflow"); top++; s[top] = x; C) if (top == s.length-1) throw new RuntimeException("Overflow"); s[top] = x; top++; D) if (top == s.length) throw new RuntimeException("Overflow"); s[top] = x; top++;
You can shoot ____ footage with just about any digital camera and use your computer to edit it.
A. digital video B. clip C. movie D. music