1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lesechka [4]
4 years ago
6

Type of media that uses laser technology to store data and programs is

Computers and Technology
1 answer:
olganol [36]4 years ago
8 0
The answer is compact disc or cd, only device that use lasers (that arent proprietary floppys) 
You might be interested in
Which of the following attack is a threat to confidentiality?
velikii [3]

Answer:

The correct answer is letter "B": masquerading.

Explanation:

The attack referred to as masquerading simply consists of impersonating the identity of an authorized user of an information system. The impersonation could take place electronically -<em>the user has a login and password that does not belong to him to access a server</em>- or personally -<em>employees accessing restricted areas of a company.</em>

3 0
3 years ago
Consider the following statement from the CS Principles course framework: The global distribution of computing resources raises
SSSSS [86.1K]

Answer:

The issue of access when it comes to global distribution of computing  resources can be described as that which entails an inequality in access when it comes to computing resources at different location of the world and this is most times due to the inequality in cost of these computing resource around the world result from inequality in availability .

This issue affect me as a person for example due to the fact that i am living in a third world country i find it harder to complete task that access to computing resources would have made easier because the cost of gaining  access  to computing resources is high compared to developed countries

Explanation:

Well the answer above is in two parts the first part talks about the issue while the second throws more light on the issue with a personal example with a view of make the point then driving it home and then keeping it brief

3 0
3 years ago
Which of the following is a rule of thumb for cell phones or smartphone etiquette ?
zimovet [89]
Do not text whilst at the dinner table or cross the road (even a Zebr crossing) while texting.
3 0
4 years ago
Why don't we get together to watch the Academy Awards?
Step2247 [10]

Answer:

idk I'm not sure cause yeah

5 0
3 years ago
Read 2 more answers
The Fibonacci sequence begins with 0 and then 1 follows. All subsequent values are the sumof the previous two, for example: 0, 1
PSYCHO15rus [73]
0437818437848484919464689
4 0
3 years ago
Other questions:
  • Use the image below to answer this question.
    14·1 answer
  • What is the purpose of ergonomics in the workplace? A.Keep workers safe and injury free
    5·2 answers
  • You are testing a web application for sql injection vulnerabilities. you send various sql statements which return results on the
    5·1 answer
  • To create a formula in. . You would first click in one of the cells
    12·2 answers
  • A form’s height is ______________________.<br><br> A property<br><br> A method<br><br> An event
    10·1 answer
  • When are bar charts most commonly used
    10·1 answer
  • Please someone helpp
    12·2 answers
  • What is an advantage of cross-brace bridge​
    10·1 answer
  • What is a cloud in the world of computing
    7·1 answer
  • Consider the following code.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!