1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler79 [48]
3 years ago
13

A musical compact disc is an example of

Computers and Technology
1 answer:
Mice21 [21]3 years ago
6 0
A musical compact disc is an example of<span> data storage.

I hope this helps! <3

-Hannah
</span>
You might be interested in
The ___________ button represents the start of a hyperlink in Table of contents.
zubka84 [21]

Answer:

An LS button

Explanation:

It appears on the (structure line 3)on the structure line, place your cursor in the <u>whi</u><u>te</u> field to the right of the E button (Recall that the E button represent the entry test).

3 0
3 years ago
What is a database query?
lana [24]
C.a form used to create a new tables for the database
8 0
3 years ago
Read 2 more answers
What is the current record holder for the fastest car in the world? What is the top speed of it? 100 points to whoever gets it c
olchik [2.2K]
It’s 257 mph

Hope this helps !!!!!
7 0
3 years ago
Read 2 more answers
Does anyone know the code for codeHS 5.4.7 teenagers?
Over [174]

Answer:

function start(){

var age = readInt("Age: ");

if(age == 15){

println("Yes, you are a teenager.");

}else{

println("No, you are not a teenager.");

}

}

Explanation:

6 0
3 years ago
Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the
Nesterboy [21]

Answer:

c. both the user and the provider of encrypted data.

Explanation:

In assymetric key encryption, you will need the public key of the sender to decode the information along with your private key to decode the encrypted information. if you don't have any of the keys, you won't be able to read the information. You must have both in order to read the information sent.

5 0
3 years ago
Other questions:
  • Write a Tip Calculator in code in VMware Fusion
    13·1 answer
  • What is the typical relationship between time and interest rate?
    12·1 answer
  • Impact of computer on education
    6·2 answers
  • PLEASE HELP
    14·2 answers
  • Why it’s important to keep the standard internet protocol TCP/IP?
    11·1 answer
  • Which is an unbound form with menu options for navigating a database?
    11·2 answers
  • A hidden backlog contains the projects that the IT department is not aware of because of low feasibility.
    13·1 answer
  • (BRAINLIEST QUESTION!!!)
    11·1 answer
  • List the five parts of a system.describe them.
    13·1 answer
  • 12.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!