1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
3 years ago
5

Typically, a dvd has how many times more capacity than a cd?

Computers and Technology
1 answer:
Marianna [84]3 years ago
6 0
For a simple answer, it is aproximately 7 times more than a CD.
You might be interested in
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames
aksik [14]

Answer: (B) An insider

Explanation:

 According to the question, an Angela is an insider as she maintain all the sensitive and confidential information of the customer like the password, username,SSN (Social security number) and the personal information.

Angela and her co-worker has the right for using the customer sensitive information and data. An insider is the person who keeps all the sensitive information of the organization or company.

5 0
3 years ago
In 1-2 sentences, describe how to use the thesaurus in the Word Processor you have used.
jasenka [17]
Thesaurus is a tool use to find the synonym of the of a word.
Here's the way to use the thesaurus in the word processor.
=> highlight the word, then right-click, Navigate to synonyms and the words will  display.
3 0
3 years ago
Read 2 more answers
What is the current through R1?
patriot [66]
I = V/R. So the answer is 9/200 = 0.045A = 45mA which is B
8 0
3 years ago
This isn't an academic question, but it's a question about something I am consistently seeing on Brainly, so please don't delete
s344n2d4d5 [400]
Yes it does. Hope that answers
3 0
2 years ago
Read 2 more answers
What are two reasons for using layered protocols? what is one possible disadvantage of using layered protocols?
Ostrovityanka [42]
Some of the disadvantages of using layered protocols are the redundancy and overall lower performance.
Reimplementing everything from remote and wired to connectionless and association situated application correspondence, with each ringer and shriek of BGP, MPLS, multicast steering and so on would be a gigantic endeavor and potentially unmanageable in this solid across the board convention. I could envision specialty utilize situations where most extreme execution is imperative most importantly where an exceptionally basic framework might be wanted.
8 0
3 years ago
Other questions:
  • Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
    8·1 answer
  • 18) choose which article title would most likely be described by the database subject headings victims of famine, ireland, histo
    14·1 answer
  • Why would an online survey of 2,000 visitors to your college’s Web site be of little use in assessing the neighboring community’
    7·1 answer
  • What is a column in a table
    10·2 answers
  • Describe at least two other companies that are direct or indirect competitors to your company. Explain how you will differentiat
    15·1 answer
  • Eliza needs to share contact information with another user, but she wants to include only certain information in the contact. Wh
    9·2 answers
  • What is the purpose of the Excel Function Reference?
    9·1 answer
  • The following is a true example of a computer: A. Toyota Camry
    12·1 answer
  • An if statement must always begin with the word “if.” True False python
    15·2 answers
  • Calculate The Average of Grades Instructions:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!