Software is sometimes illegally modified in order to disable ________ technologies such as copy protection and authenticity checks.

A. Turing
B. attribution
C. DRM
D. fair use

Answer: C

Computer Science & Information Technology

You might also like to view...

Consider a class that uses the following variables to implement an array-based stack:

``` String [] s = new String[100]; int top = -1; // Note top == -1 indicates stack is empty ``` a method that implements a void push(String x) operation can be written as A) if (top == s.length-1) throw new RuntimeException("Overflow"); top++; s[top] = x; B) if (top == s.length) throw new RuntimeException("Overflow"); top++; s[top] = x; C) if (top == s.length-1) throw new RuntimeException("Overflow"); s[top] = x; top++; D) if (top == s.length) throw new RuntimeException("Overflow"); s[top] = x; top++;

Computer Science & Information Technology

You can shoot ____ footage with just about any digital camera and use your computer to edit it.

A. digital video B. clip C. movie D. music

Computer Science & Information Technology