• الصفحة الرئيسية
  • إتصل بنا
  • سياسة الخصوصية
Logo
  • الرئيسية
  • أفكار
  • صحة
  • معلومات
  • عجائب وغرائب
  • تكنولوجيا
الصفحة الرئيسية IT Law IT Tutorials What is literal and non-literal copying of computer programs?

What is literal and non-literal copying of computer programs?

الكاتب ahmed في 2:01 AM IT Law IT Tutorials
 literal and non-literal copying of computer programs

Copying a computer program can be literal, where the program code itself is copied, in which case the two programs are written in the same computer programming language. Alternatively, copying can be non-literal, where elements of the program such as its structure, sequence of operations, functions, interfaces and methodologies are copied but the program code is not directly copied.


Literal copying occurs where a person copies an existing program by disk to disk copying or by writing out or printing the program listing, perhaps to key it into another computer at a later date. In either case, the person making the copy may make some alterations to the copy. These may be to disguise its origins or to enhance the program, for example, by adding some additional functions. Literal copying is relatively easy for infringement. Even relatively small programs will be the result of the programmer's skill, experience and judgment. The following case in the first to seriously consider the issues relating to literal copying of computer programs and lays down some important precedents for software copyright.

The law's recognition of non-literal copying is important because otherwise it would be too easy to defeat copyright protection of computer programs. With some works of copyright, it is an easy matter to distinguish between the literal and non-literal elements. For example, with a work of literature, perhaps in the form of an historical novel, the literal element comprises the words, sentences and paragraphs as expressed in print, while the non-literal elements, in which case they may have their own copyright independent of the copyright subsisting in the finished novel. However, in the absence of such materials, it is clear that taking the non-literal elements can infringe.

You may also wanted to view the following related posts

  • What is Cyber-law?
  • What is Cyber Crime and What are the types?
  • What is intellectual property law?
  • Defining e-commerce
  • Classification of E-commerce by transaction partners
  • Definition of E-Government
  • Challenges and Opportunities for Developing a Successful E-Government
  • Factors Affecting the Success of E-Government

You can view the following other posts

  • List of bad ways for building backlinks
  • List of good ways of building quality backlinks
  • List of top .edu forums or sites to create quality backlinks
  • Solved MCQ of Database Management System (DBMS) Set - 3
  • Solved MCQ of System Analysis and Design Set-3
  • Solved MCQ of Data Structure Set - 2
  • Solved MCQ of Java for Java Proficiency test set-3
  • MCQ of C++ with answer Set-2
  • MCQ of Computer Networking with answer set-4
شارك المقال :
Tweet
✚

مقالات ذات صلة

التالي
المشاركةالتالية
السابق
المشاركة السابقة

تحويل كودإخفاء محول الأكواد الإبتساماتإخفاء

شكرا لمشاركتنا رأيك
Subscribe to: Post Comments (Atom)
  • Facebook
  • twitter
  • googleplus
  • youtube
  • linkedin

الأكثر زيارة

  • Solved MCQ on Database Backup and Recovery in DBMS set-1
    1) Which of the following is not a recovery technique? A. Deferred update B. Immediate update C. Two-phase commit D. Recovery management 2)C...
  • 8 طرق طبيعية فعالة لعلاج حب الشباب
    حب الشباب يعد من اكثر الاشياء المزعجة التي يعاني منها الكثير من الناس  وفي هذا الموضوع سنتناول افضل الطرق الطبيعية للتخلص من حب ...
  • Best 10 ways of making money online
    Best 10 ways of making money online
    Making money online is not easy task if you don't know about the best and easy ways for that. Since, Internet is itself a virtual world,...
  • Top 10 List Of Stock Photography Sites To Earn Online
    I have already posted that, through stock photography sites you can earn online by sharing your original stocked photographs. You should po...
  • What are the different types of scheduling methods?
    Process scheduling is one way for a processor to handle n processes , by scheduling the execution process. Each process is executed one by ...
  • List of sites to create shortcut URL for your bog or site
    V3.com URL Forwarding: url or domain forwarding (also called 'redirect') transfers your traffic from your V3 Sub Domain to another ...
  • SQL MCQ Interview Questions With Answers set-3
    1. In SQL , which command is used to remove a stored function from the database? Cover of SQL Server magazine (Photo credit: Wikipedia ) A) ...
  • How to Create Oracle Forms by Using Wizard ?
    How to Create Oracle Forms by Using Wizard ?
    Oracle Forms is a technology developed by Oracle to develop database driven web applications quickly and easily. It is a component of Oracle...
  • Solved MCQ on Physical Layer in OSI Reference Model set-1
    1) Which of the following is/are the applications of twisted pair cables ...... A. In the local loop B. In the DSL line C. In the ISDN Netwo...
  • MCQ on c++ Programming with Answers set-6
    1. If a class C is derived from class B, which is derived from class A, all through public inheritance, then a class C member function can a...

الأقسام

  • Artificial Intelligence(AI)
  • Backlinking
  • Basic IT
  • Best List
  • Blogging Tips
  • C
  • C#
  • C++
  • Computer Architecture
  • Computer Fundamental
  • Computer Security
  • Computer/IT Officer Exam
  • CSS
  • Data Mining and Warehousing
  • Data Recovery Tools
  • Data Structure
  • Database Management System
  • E-commerce
  • E-government
  • Internet & Web Designing
  • IT Law
  • IT Tips and Tricks
  • IT Tutorials
  • Java
  • JavaScript
  • Keyword Research Tools
  • MIS
  • Multiple Choice Question (MCQ)
  • Networking
  • Online Earning
  • Online IT Jobs
  • Operating System
  • Oracle Forms and Reports
  • Programming Guide
  • Programming Language
  • SEO
  • Social Networking Sites
  • Software Download
  • Software Engineering
  • System Analysis and Design
  • Top List
  • VB.Net
  • صحة
  • عجائب وغرائب

الأرشيف

  • ►  2017 (4)
    • ►  November (3)
    • ►  October (1)
  • ►  2016 (5)
    • ►  April (5)
  • ►  2015 (87)
    • ►  August (1)
    • ►  July (8)
    • ►  June (13)
    • ►  May (2)
    • ►  April (2)
    • ►  March (4)
    • ►  February (20)
    • ►  January (37)
  • ►  2014 (77)
    • ►  December (31)
    • ►  November (4)
    • ►  September (4)
    • ►  August (11)
    • ►  July (8)
    • ►  June (2)
    • ►  May (2)
    • ►  April (2)
    • ►  March (2)
    • ►  February (7)
    • ►  January (4)
  • ▼  2013 (132)
    • ►  December (11)
    • ►  November (6)
    • ►  October (4)
    • ►  September (6)
    • ►  August (16)
    • ►  July (9)
    • ►  June (9)
    • ►  May (12)
    • ►  April (13)
    • ▼  March (23)
      • Best 10 ways of making money online
      • List of top 7 Free bulk search engine submission t...
      • Solved Objective Questions of Computer Fundamental...
      • How to earn online from Top revenue sharing sites?
      • What is literal and non-literal copying of compute...
      • Solved Objective Questions of System Analysis and ...
      • MCQ of System Analysis and Design with answer set-4
      • Top 10 article writing tips for blogger.
      • What is the scope of computer science or IT study?
      • What is intellectual property law?
      • What is Cyber Crime and What are the types?
      • What is Cyber-law?
      • MCQ of Software Engineering with answer Set-2
      • Solved MCQ of Software Engineering Set-1
      • MCQ of Artificial Intelligence (AI) with answer Set-2
      • Solved MCQ of Database Management System (DBMS) Se...
      • MCQ of Visual Basic dot net (VB.Net) with answer s...
      • Solved MCQs of Visual Basic.Net set-1
      • What are the technical limitations of twitter acco...
      • How to prevent your twitter account from being sus...
      • MCQ of Database Management System(DBMS) with answe...
      • List of bad ways for building backlinks
      • Solved MCQ for Computer Officer Exam part-1
    • ►  February (6)
    • ►  January (17)
  • ►  2012 (59)
    • ►  December (15)
    • ►  November (20)
    • ►  October (21)
    • ►  September (3)

إنضم لنا

© 2017 أفكار جميع الحقوق محفوظة