1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lena [83]
3 years ago
8

Question 2 of 5

Computers and Technology
1 answer:
goblinko [34]3 years ago
3 0
B. Find one or two co-workers that you can complain to.
You might be interested in
Typically, a dvd has how many times more capacity than a cd?
Marianna [84]
For a simple answer, it is aproximately 7 times more than a CD.
6 0
3 years ago
What are the uses of DVD Ram​
Verdich [7]

Answer:

Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.

4 0
3 years ago
Read 2 more answers
This function checks if a character is a vowel. If it is, it returns true. Otherwise, it returns false. Where should return fals
Marianna [84]

Answer:

at the end, i.e., after the for loop.

Explanation:

see code.

I also added a cooler alternative implementation.

6 0
3 years ago
How do you make a photo the background on microsoft powerpoint?
Anna35 [415]
Well it is a very simple process all you do is open adobe photoshop and then put your picture in there then you go to your power point and go to file then new go to custom background got to photoshop chance the dimensions to your liking and boom done 
4 0
3 years ago
What type of switch connects users to the network?
SSSSS [86.1K]
A domain or asynchronous Ethernet.. I think its the first one though...
6 0
3 years ago
Other questions:
  • Don is the superintendent of the county school system. What task might Don
    8·1 answer
  • A slideshow that accompanies an oral report is known as what?
    6·1 answer
  • Which among the following choices is correct based on the two statements listed below? Statement 1: When the lexical analyzer sc
    12·1 answer
  • This is just for the points
    15·2 answers
  • Explain how principles of computer programming are applied in different languages to produce
    5·1 answer
  • Which kind of image is indispensable and needs added text to go with it?
    13·1 answer
  • Write a for loop to print all the even numbers from 200 to 300.
    14·1 answer
  • True or False? Threat modeling is the practice of identifying and prioritizing potential threats and security mitigations to pro
    9·1 answer
  • Speed and security are advantages generally associated with<br> networks.
    9·1 answer
  • Daily IT Question
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!