1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vovangra [49]
3 years ago
15

Hannah decides to burn her video portfolio to a DVD. She wants to hand it over to a movie producer she will meet at a social eve

nt. What Important step must she take to give her DVD a professional look?
OA. place the DVD in a white envelope
OB. write her contact details on the DVD
O C. print a DVD label with her contact details
OD. provide her resume with the DVD​
Computers and Technology
1 answer:
Gwar [14]3 years ago
7 0
C maybe I am not sure this
You might be interested in
After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued
adoni [48]

Answer: NVRAM(Non-volatile random-access memory)

Explanation:Non-volatile random-access memory(NVRAM) is the memory that has a non-volatile nature.It is used for retaining of the data even when the system gets switched off .

This memory uses the power source from the CMOS battery for executing the functions. It is designed by using the pin configurations containing 24 pin in DIP(Dual inline package). So the situation mentioned in the question of storing the changes will appear in the NVRAM.

4 0
4 years ago
PLEASE HELP!!!
uysha [10]
The next line is 0___________________________
3 0
3 years ago
Describe at least two ways social media has impacted cybersecurity.
dybincka [34]

Answer:

Its Providing Too Much Personal Information since you will be using social media to promote your own small business, you need to take extra precautions. For starters, don’t leave a trail of breadcrumbs for social media hackers. Whether you are representing yourself or your company, avoid sharing stuff like your date of birth, places where you have attended school, as well as names and pictures of your family members.

Disgruntled Employees

While it’s fairly normal for your employees to vent about working for your company, in doing so, they may inadvertently reveal more than they should. It’s a lot more common than you think, since 98% of all employees are using at least one social media platform, and as much as 50% of those are talking about their respective companies. Whether they are sharing sensitive info or posting pictures from their workplace, they may end up sharing something that might hurt your business.

Explanation:

7 0
3 years ago
Which functions are part of the array module? Select 2 options. Assume you have already entered these lines of code.
wlad13 [49]

Answer:

arr.index(3)

arr.append(3)

Edge2020

7 0
3 years ago
Read 2 more answers
Write the importance of Data and software Security​
matrenka [14]

Answer:

Data security is when protective measures are put in place to keep unauthorized access out of computers, websites, and databases. This process also provides a mechanism for protecting data from loss or corruption.

Explanation:

please make me brainiest if it helps you

6 0
3 years ago
Other questions:
  • A slide in Blake's presentation contained the following information:
    11·1 answer
  • What advantage do ExpressCard modules and U.S.B adapters offer over expansion cards?
    10·1 answer
  • Which of the following is involved in creating technical communication?
    7·1 answer
  • Use of the Internet for recruiting is: a. popular with job seekers, but not recruiters. b. the most commonly used search tactic
    5·1 answer
  • What is the purpose of a mutator?
    8·1 answer
  • What is a web server?​
    11·1 answer
  • a bus is full of passengers. if you count them by either twos, threes, or fives, there is one left. if you count them by seven t
    10·1 answer
  • Using a vue-cli initiated project, make a ticker that will keep track of the number of attendees in a space
    9·1 answer
  • When using the Internet, do not give out your __________ without your parents' permission. (Select all that apply.)
    7·1 answer
  • the graph at left in the tctct, c-plane models the global wind power capacity, ccc, in gigawatts, ttt years since 199619961996.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!