• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

EULA

Extracts from this document...

Introduction

Onscreen eula text: END-USER LICENSE AGREEMENT FOR MICROSOFT SOFTWARE IMPORTANT-READ CAREFULLY: This Microsoft End-User License Agreement ("EULA") is a legal agreement between you (either an individual or a single entity) and Microsoft Corporation for the Microsoft software product identified above, which includes computer software and may include associated media, printed materials, and "online" or electronic documentation ("SOFTWARE PRODUCT"). The SOFTWARE PRODUCT also includes any updates and supplements to the original SOFTWARE PRODUCT provided to you by Microsoft. Any software provided along with the SOFTWARE PRODUCT that is associated with a separate end-user license agreement is licensed to you under the terms of that license agreement. By installing, copying, downloading, accessing or otherwise using the SOFTWARE PRODUCT, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, do not install or use the SOFTWARE PRODUCT; you may, however, return it to your place of purchase for a full refund. SOFTWARE PRODUCT LICENSE The SOFTWARE PRODUCT is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE PRODUCT is licensed, not sold. 1. GRANT OF LICENSE. This EULA grants you the following rights: * Applications Software. You may install, use, access, display, run, or otherwise interact with ("RUN") one copy of the SOFTWARE PRODUCT, or any prior version for the same operating system, on a single computer, ("COMPUTER"). If not prevented by copy protection technology, the primary user of the COMPUTER on which the SOFTWARE PRODUCT is installed may make a second copy for his or her exclusive use on a portable computer. * Editors. If the SOFTWARE PRODUCT contains a software Editor you may use the Editor in conjunction with that content specifically identified in the documentation for use with the Editor. If no content files are identified, you may not use content or other files from the SOFTWARE PRODUCT with the Editor. ...read more.

Middle

of the SOFTWARE PRODUCT. 6.COPY PROTECTION. The SOFTWARE PRODUCT may require the original media for use of the SOFTWARE PRODUCT on the COMPUTER and/or employ copy protection technology to prevent the unauthorized copying of the SOFTWARE PRODUCT. It is illegal to make unauthorized copies of the SOFTWARE PRODUCT or circumvent any copy protection technology employed in the SOFTWARE PRODUCT. 7.U.S. GOVERNMENT RESTRICTED RIGHTS. All SOFTWARE PRODUCT provided to the U.S. Government pursuant to solicitations issued on or after December 1, 1995 is provided with the commercial rights and restrictions described elsewhere herein. All SOFTWARE PRODUCT provided to the U.S. Government pursuant to solicitations issued prior to December 1, 1995 is provided with RESTRICTED RIGHTS as provided for in FAR, 48 CFR 52.227-14 (JUNE 1987) or FAR, 48 CFR 252.227-7013 (OCT 1988), as applicable. 8.EXPORT RESTRICTIONS. This SOFTWARE PRODUCT has been classified by the US Government as exportable under License Exception TSU. Therefore the following terms apply : You agree that you will not export or re-export the SOFTWARE PRODUCT, any part thereof, or any process or service that is the direct product of the SOFTWARE PRODUCT (the foregoing collectively referred to as the "Restricted Components"), to any country, person or entity subject to U.S. export restrictions. You specifically agree not to export or re-export any of the Restricted Components (i) to any country to which the U.S. has embargoed or restricted the export of goods or services, which currently include, but are not necessarily limited to Cuba, Iran, Iraq, Libya, North Korea, Sudan and Syria, or to any national of any such country, wherever located, who intends to transmit or transport the Restricted Components back to such country; (ii) to any person or entity who you know or have reason to know will utilize the Restricted Components in the design, development or production of nuclear, chemical or biological weapons; or (iii) to any person or entity who has been prohibited from participating in U.S. export transactions by any federal agency of the U.S. government. ...read more.

Conclusion

OU IMPLICITE, Y COMPRIS MAIS NE SE LIMITANT PAS AUX GARANTIES OU CONDITIONS IMPLICITES DU CARACT�RE AD�QUAT POUR LA COMMERCIALISATION OU UN USAGE PARTICULIER EN CE QUI CONCERNE LE LOGICIEL OU CONCERNANT LE TITRE , L'ABSENCE DE CONTREFA�ON DUDIT LOGICIEL, ET TOUTE DOCUMENTATION �CRITE QUI L'ACCOMPAGNE, AINSI QUE POUR TOUTE DISPOSITION CONCERNANT LE SUPORT TECHNIQUE OU LA FA�ON DONT CELUI-CI A �T� RENDU. CETTE GARANTIE LIMIT�E VOUS ACCORDE DES DROITS JURIDIQUES SP�CIFIQUES. PAS DE RESPONSABILIT� POUR LES DOMMAGES INDIRECTS - MICROSOFT OU SES FOURNISSEURS NE SERONT PAS RESPONSABLES EN AUCUNE CIRCONSTANCE POUR TOUT DOMMAGE SP�CIAL, INCIDENT, INDIRECT, OU CONS�QUENT QUEL QU'IL SOIT (Y COMPRIS, SANS LIMITATION, LES DOMMAGES ENTRAIN�S PAR LA PERTE DE B�N�FICES, L'INTERRUPTION DES ACTIVIT�S, LA PERTE D'INFORMATION OU TOUTE AUTRE PERTE P�CUNIAIRE) D�COULANT DE L'UTILISATION OU DE L'IMPOSSIBILIT� D'UTILISATION DE CE LOGICIEL AINSI QUE POUR TOUTE DISPOSITION CONCERNANT LE SUPORT TECHNIQUE OU LA FA�ON DONT CELUI-CI A �T� RENDU ET CE, M�ME SI MICROSOFT A �T� AVIS�E DE LA POSSIBILIT� DE TELS DOMMAGES. LA RESPONSABILIT� DE MICROSOFT EN VERTU DE TOUTE DISPOSITION DE CETTE CONVENTION NE POURRA EN AUCUN TEMPS EXC�DER LE PLUS �LEV� ENTRE I) LE MONTANT EFFECTIVEMENT PAY� PAR VOUS POUR LE LOGICIEL OU II) US$5.00. ADVENANT QUE VOUS AYEZ CONTRACT� PAR ENTENTE DISTINCTE AVEC MICROSOFT POUR UN SUPPORT TECHNIQUE �TENDU, VOUS SEREZ LI� PAR LES TERMES D' UNE TELLE ENTENTE. La pr�sente Convention est r�gie par les lois de la province d'Ontario, Canada. Chacune des parties � la pr�sente reconna�t irr�vocablement la comp�tence des tribunaux de la province d'Ontario et consent � instituer tout litige qui pourrait d�couler de la pr�sente aupr�s des tribunaux situ�s dans le district judiciaire de York, province d'Ontario. Au cas o� vous auriez des questions concernant cette licence ou que vous d�siriez vous mettre en rapport avec Microsoft pour quelque raison que ce soit, veuillez contacter la succursale Microsoft desservant votre pays, dont l'adresse est fournie dans ce produit, ou �crivez � : Microsoft Sales Information Center, One Microsoft Way, Redmond, Washington 98052-6399. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Justify a particular installation or upgrade. I have installed a Microsoft Visio because ...

    For example when you upgrade your operating system from Microsoft Windows XP to Microsoft Windows 7. The best way to minimise this risk is to do the installation or the upgrade outside of working hours of the company. This way you will not disturber any ones work.

  2. Hardware and Software

    Monitors: LCD (Liquid Crystal Display) monitors are based on a newer technology and are becoming very popular, mainly because they have great space and energy saving advantages over CRT (Cathode Ray Tube) monitors. CRT and LCD monitors are based on completely different technologies, and thus have quite different display.

  1. Explain the component parts of a computer system - Include both hardware, software and ...

    Security involves more than just protecting a computer from theft. Computers and the data stored on them must be protected from intentional and accidental damage. The following are examples of computer security problems: * Accidental Loss - Accidental loss can occur quite easily when for example, users delete files to create more space without really knowing what they have deleted.

  2. I have been given the task to design a database for a company called ...

    This computer design is such that the user uses a list box to enter in the weight therefore the use would not enter in 1.5. Length 25 is allowed as it is within the boundaries and the total dimensions are also within the boundaries.

  1. What is Java?

    The sum of the objects (parts) make up the whole. The main difference is that Java can stand on its own while JavaScript must be placed inside an HTML document to function. Java is a much larger and more complicated language that creates "standalone" applications.

  2. Computer Aided Design Package

    This is a lot easier then using a mouse or other pointer device for the user because they have more control over their drawings with the graphics tablet, which means they will make less mistakes, saving time on their drawings and making the designing process quicker.

  1. Definition-nature of the problem solved - Car Mechanic business

    Existing Data Analysis- The only data kept by the company is that regarding the individual customers and these are kept confidential as it is personal data. The interview I will prepare for is with the main manager because he will have the information most useful to me.

  2. Analysis of Johnson Music

    Firstly, I will contact the owner of the shop to arrange an interview with his staff and make sure it is okay for me to conduct my project. Letter to initially contact (for samples of originals see appendix) Mr Johnson, My friends and I have been customers in your shop (Johnson Music)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work