SlideShare a Scribd company logo
1 of 1
Christina Lalama There are many issues in the educational system that we have learned about in our EDU 290 class. I have learned a lot about copy right laws. I thought that everything was free and fair to use if it was put on the internet, when now I have learned that is not true.

More Related Content

What's hot

Naive bayes
Naive bayesNaive bayes
Naive bayesumeskath
 
The Widow’S Two Coins
The Widow’S Two CoinsThe Widow’S Two Coins
The Widow’S Two CoinsMary Sorial
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)shraddha_b
 
B trees in Data Structure
B trees in Data StructureB trees in Data Structure
B trees in Data StructureAnuj Modi
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscapeyohansurya2
 
Parallel sorting Algorithms
Parallel  sorting AlgorithmsParallel  sorting Algorithms
Parallel sorting AlgorithmsGARIMA SHAKYA
 
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric VanderburgInformation Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric VanderburgEric Vanderburg
 

What's hot (10)

Naive bayes
Naive bayesNaive bayes
Naive bayes
 
Data security
Data securityData security
Data security
 
The Widow’S Two Coins
The Widow’S Two CoinsThe Widow’S Two Coins
The Widow’S Two Coins
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
B trees in Data Structure
B trees in Data StructureB trees in Data Structure
B trees in Data Structure
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscape
 
Parallel sorting Algorithms
Parallel  sorting AlgorithmsParallel  sorting Algorithms
Parallel sorting Algorithms
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric VanderburgInformation Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
 

Slideshare ppt

  • 1. Christina Lalama There are many issues in the educational system that we have learned about in our EDU 290 class. I have learned a lot about copy right laws. I thought that everything was free and fair to use if it was put on the internet, when now I have learned that is not true.