1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Y_Kistochka [10]
3 years ago
5

To write on a cd-rw disc, users must have cd-rw software and a cd-rw ____.

Computers and Technology
1 answer:
Karo-lina-s [1.5K]3 years ago
4 0
Hello there!

It would be A cd - rw Drive.

Hope This Helps You!
Good Luck :)
You might be interested in
What are your undertale + au ships?
fenix001 [56]
What is an undertale? Lol
3 0
3 years ago
In computer science, what is the name for a series of steps used to solve a problem?
liraira [26]

Answer:

Algorithm

Explanation:

It is the step by step procedure,which defines a set of instructions which is to be carried out by the computer

5 0
3 years ago
What is intellectual property?
xz_007 [3.2K]

Answer:

The 3rd one

Explanation:

Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

7 0
3 years ago
Which of the following statements about personality are true? Check all of the boxes that apply.
kupik [55]

Answer:

- personallity is an individual's unique combination of attitudes, behaviors, and characteristics.

-(maybe)Being aware of personality characteristics helps people identify their natural abilities and determine  potential careers.

Explanation:

hope helped

7 0
3 years ago
The___is a waterproof fabric that is placed around your camera
Zina [86]
Can you help me with homework and the answer is a circle
5 0
3 years ago
Other questions:
  • Electrical pressure is also called
    5·2 answers
  • Which of the file names below follows standard file naming convention
    13·1 answer
  • Lisa managed incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
    9·1 answer
  • Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust serve
    11·1 answer
  • The first step to accurate coding is to identify the ___________ in the diagnostic statement.
    7·1 answer
  • Apex
    5·2 answers
  • Reading (BCK FORM 2C IT 2020-2021)
    12·2 answers
  • 4. In Drag and Drop method of Excel , to copy the data , you need to press __________ key while dragging the cells.
    7·1 answer
  • Which of the following is an example of phishing attack? csp
    8·1 answer
  • Identify and explain groups that may be impacted by nanotechnology.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!