1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vredina [299]
3 years ago
10

Compare and contrast CD and DVD?

Computers and Technology
2 answers:
Alex777 [14]3 years ago
6 0
The most obvious difference between the two is that CD’s can store up to 700MB, while DVD’s can store up to 4.7GB.
anzhelika [568]3 years ago
4 0

Answer:

Both Flat, round discs.

A DVD can hold six times as much as compacity than a disc.

A CD is a Compact Disc.

You might be interested in
How can you add more bytes to your iPad if there isn't enough storage space?
miv72 [106K]
You cant, you have to either delete items off to gain some storage back or go buy an ipad with more storage
3 0
3 years ago
Read 2 more answers
Explain how electric power and electrical energy are related
AlladinOne [14]

Electric power and electrical energy are related because electrical energy comes from electrical power. If one comes from the other, they are related. Hope this helps!

3 0
3 years ago
Read 2 more answers
What types of data can you filter using the
Butoxors [25]

Answer: A and B

Explanation: just did it on edge

4 0
3 years ago
Pls help help i will give brainliest help pls​
Veronika [31]

Answer:

3 or 2

Explanation:

8 0
3 years ago
Which web application attack is more likely to extract privacy data elements out of a database?
klasskru [66]
<span>The answer is SQL Injection
</span>
This kind of attack is the most prone to extract privacy data elements out of a database. An SQL injection like any other attack may take several attempts to pull it off and is more likely to extract private data. With admin rights or escalated priviledges, SQL injections can be used to enter the database.







6 0
3 years ago
Other questions:
  • Which term describes the order of arrangement of files and folders on a computer?
    11·1 answer
  • The acronym is used to define the process that allows multiple devices to share a single routable ip address.
    6·1 answer
  • Write an expression that will cause the following code to print "Equal" if the value of sensorReading is "close enough" to targe
    9·1 answer
  • What frequency band is used by bluetooth, 802.11b, and 802.11g?
    12·1 answer
  • Varun wants to start his own business. Suggest him at least four functions of an entrepreneur.
    8·2 answers
  • Aapke question about computer keyboard​
    5·1 answer
  • Wide area network (WAN) connects multiple networks that are in the same geographical locations.
    6·1 answer
  • Why is failure important when you are designing a solution to a problem?
    6·2 answers
  • What would a bar graph best be used for? State why and give 2-3 examples of things you could demonstrate with a bar graph
    5·1 answer
  • Please code in python and add comments to code
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!