1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kumpel [21]
3 years ago
10

? Which console was the first to use CD-ROM storage? PlayStation Atari Jaguar PlayStation 3 Xbox 360

Computers and Technology
1 answer:
kaheart [24]3 years ago
7 0

that is incorrect! Playstation is the correct answer

You might be interested in
The most serious security threat to Bluetooth-enabled devices is ____, which occurs when a hacker gains access to the device and
Semmy [17]

The most serious security threat to Bluetooth-enabled devices is \sf\purple{bluebugging}, which occurs when a hacker gains access to the device and its functions without the owner's consent.

\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{.}}}}}

6 0
3 years ago
Hyper-Tech Enterprises manufactures mechanical parts used in air conditioning and heating units. The company employs over 300 wo
Andre45 [30]

Answer:

d

Explanation:

The one action listed in the question that would suggest unfair labor practices would be if Hyper-Tech managers prohibited the distribution of union literature in the company cafeteria. This is because a company can prevent employees from partaking in other tasks and getting distracted while on duty. When an employee is on duty they are getting paid to focus and complete their responsibilities. An employer also has the right to prevent non-employee individuals from entering private property such as their facility. What a company cannot do is prevent their employees from deciding what the literature that they want to read or the decisions that they want to make outside of work hours. Therefore, preventing the employees from accepting literature while on their break time would be considered unfair labor practice.

4 0
3 years ago
Someone, please answer this.
Sav [38]

Answer: A loop will continue running until the defined condition returns false . ... You can type js for , js while or js do while to get more info on any of these. ... initialization - Run before the first execution on the loop. ... But it can be used to decrement a counter too. statement - Code to be repeated in the loop.

Explanation:

7 0
3 years ago
All of these valid ways to earn money in microworkers except
vovikov84 [41]

Answer:

yes u are trus

Explanation:

mark me as brainliest hehe

8 0
3 years ago
What classes should I take in high-school for majoring in computer science?
Gala2k [10]

Answer:

Computer science are the disciplines that study information, computing and the applications or ecosystems where they are developed. It is a science that comes from applied mathematics and has 3 branches that are quite well known. On the one hand we have software engineering, secondly theory as such (primary study of algorithms and data, etc.) and finally the application of the amalgam of the first two, which end up resulting in disciplines such as big data, cybersecurity or computer security, machine learning, artificial intelligence, etc. However, we are talking about a very broad science with various branches of work. Technological advances that have improved the scope of education, now allow us to develop in specific skills and computer science is one of the macro careers that have benefited the most thanks to the diversity of subjects it encompasses. This is where the on-demand courses available on the edX platform come in. Computer scientists are in one of the best times for their career advancement. We invite you to be part of the technological development and information and computing technologies through online courses.

Explanation:

6 0
3 years ago
Other questions:
  • considering that two variables counters and accumulators are important in loop design. What would be their purpose?
    9·1 answer
  • Ada lovelace designed the first computer
    7·1 answer
  • How would you display all your photographic work in your résumé, if you have a large volume of work?
    10·1 answer
  • The ____ algorithm was the first public key encryption algorithm developed (in 1977 and published for commercial use.
    8·1 answer
  • Given the three side lengths, how can you tell if a triangle<br>is a right triangle?​
    5·1 answer
  • Julie is trying to decide weather or not to add a color scheme to her presentation and she asks you for your advice u should adv
    9·1 answer
  • What type of code do computers typically use to operate? A. CSS B. HTML 5 C. HTML D. Binary
    12·2 answers
  • Why is information broken down into packets
    15·1 answer
  • Please help with coding assignment.
    11·1 answer
  • An e-commerce client is moving from on-premise, legacy systems to a cloud-based platform. During the transition, the client is a
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!