1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna11 [192]
2 years ago
11

I’ll give brainliest if answers are correct

Computers and Technology
1 answer:
irina [24]2 years ago
7 0

Answer:

B and C

Explanation:

A download playback is more reliable because it's stored on the device you're using so there won't be any skipping in during the song.

And it's more portable because you don't need the internet so you can play it anywhere.

It's not D because you still have to wait for it to download before you can play it

Not E because it takes storage on your phone

Not A because the answer for A is a point for streaming

You might be interested in
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci
Slav-nsk [51]
The containment strategy prevents intruders from removing information assets from the network, and prevents attackers from using the organization's network as a launch point for subsequent attacks.
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with <span>blocking a specific IP address. Correct answer: C

</span>

8 0
3 years ago
A bluetooth device in ____ mode is part of the piconet but is in a low-power state.
adelina 88 [10]
A bluetooth device in park/hold mode is part of the piconet but is in a low-power state. These are power saving modes of operation for Bluetooth devices which are connected to a piconet and  are used when no data is to be transmitted.The hold mode is used when connecting several piconets or managing a low-power device such as temperature sensor. When the park mode is used t<span>he device is still synchronized to the piconet but does not participate in traffic.</span>
7 0
3 years ago
How many bytes are in 1 kilobyte of storage
topjm [15]

Answer:

1000

Explanation I SEARCHED IT Up

5 0
3 years ago
Prompt
madam [21]

Have you ever tried to learn a new language or do you have friends who've had that experience?

Yes, I tried to learn Python and I even managed to do two Discord bots which are (somewhat) functional, but I'm far to say that I've managed to lean the language completly. There are lots of things to learn on a language as Python.

I also leant PHP on my own and managed to do a website (somehow) functional.

What are some of the  steps you would take to learn a new language, and what are some challenges that might arise?

The first steps in learning any computer language is learning the syntax. If you manage to do that, with the experience you gained from previous projects/languages you might be able to create something working. At times you might feel down if the project doesn't work as expected.

What are some things that  can help make the process easier?

Video tutorials, experiments and searching questions and problems on Google is a very important resource.

3 0
3 years ago
What new england industry quickly collapsed with the discovery of oil in pennsylvania
Elena-2011 [213]

It was the whaling industry.  Whaling use to be the main source of oil that was used for fuel and lighting in America which was based in the coastal communities of New England.  It went into decline when oil was discovered in 1859.  Eventually it replaced whale oil as a source of fuel and life.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which connector is most commonly used to connect printers to desktop pc systems?
    10·1 answer
  • What kind of firewall can block designated types of traffic based on application data contained within packets?
    7·1 answer
  • What is the difference between an internal and an external method call? In what situation would only internal calls be needed?
    11·1 answer
  • Which one of these do you need to become president of the US ?
    6·2 answers
  • Java !!!
    10·1 answer
  • How to use 2 tabs at once on my Lenovo yoga book?​
    9·1 answer
  • What does Amara hope will<br> happen when Dad sits on the sofa?
    8·1 answer
  • 10.13 lab 10c: output range with increment of 5 write a program whose input is two integers. output the first integer and subseq
    8·1 answer
  • When methods have ____, other programs and methods may use the methods to get access to the private data.
    5·1 answer
  • A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!