false duplication

false duplication
index counterfeit

Burton's Legal Thesaurus. . 2006

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Convention for the Protection of Producers of Phonograms Against Unauthorized Duplication of Their Phonograms — The Convention for the Protection of Producers of Phonograms Against Unauthorized Duplication of Their Phonograms, also known as the Geneva Phonograms Convention, is a 1971 international agreement relating to copyright protection for sound… …   Wikipedia

  • counterfeit — coun·ter·feit 1 / kau̇n tər ˌfit/ adj [Middle French contrefait, past participle of contrefaire to imitate, draw, paint, from contre counter + faire to make]: made in imitation of a genuine article (as a document) without authorization and esp.… …   Law dictionary

  • Down syndrome — Classification and external resources Boy with Down syndrome assembling a …   Wikipedia

  • Evolution — This article is about evolution in biology. For other uses, see Evolution (disambiguation). For a generally accessible and less technical introduction to the topic, see Introduction to evolution. Part of a series on …   Wikipedia

  • History of algebra — Elementary algebra is the branch of mathematics that deals with solving for the operands of arithmetic equations. Modern or abstract algebra has its origins as an abstraction of elementary algebra. Historians know that the earliest mathematical… …   Wikipedia

  • mathematics — /math euh mat iks/, n. 1. (used with a sing. v.) the systematic treatment of magnitude, relationships between figures and forms, and relations between quantities expressed symbolically. 2. (used with a sing. or pl. v.) mathematical procedures,… …   Universalium

  • Immunity Aware Programming — When writing firmware for an embedded system, immunity aware programming is a set of programming techniques used in an attempt to tolerate transient errors in the program counter or other that would otherwise lead to failure.Immunity aware… …   Wikipedia

  • Glossary of contract bridge terms — These terms are used in Contract bridge[1][2] , or the earlier game Auction bridge, using duplicate or rubber scoring. Some of them are also used in Whist, Bid whist, and other trick taking games. This glossary supplements the Glossary of card… …   Wikipedia

  • DCS Copy Protection — Ltd is a UK company that licenses proprietary content protection technology. It is a direct competitor to Rovi (formerly Macrovision) in the field of analogue copy protection.[1] DCS Copy Protection Ltd is a wholly owned subsidiary of Echostar… …   Wikipedia

  • Key (lock) — A cut key A key is an instrument that is used to operate a lock. A typical key consists of two parts: the blade, which slides into the keyway of the lock and distinguishes between different keys, and the bow, which is left protruding so that… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”