Liz will use a CD-R compact disk to write to more than once. Carlo will use a CD-RW compact disk to write to more than once. Who is using the correct disk for its purpose? 

       A. Only Carlo is correct.   B. Neither Carlo nor Liz is correct.   C. Both Carlo and Liz are correct.   D. Only Liz is correct.

Answers

Answer 1
A. Only Carlo is correct.

CD-R drives once burned cannot be reused, however CD-RW can be rewritten for up to 1000 times.

Related Questions

A prosthetic device is being coded on an electronic transaction. which code set should be used?

Answers

The Healthcare Common Procedure Coding System (HCPCS) should be used for coding of a prosthetic device on an electronic transaction. HCPCS is a code sets, used to code medical items such as medical supplies, orthotic and prosthetic devices, and durable medical equipment and is based on the American Medical Association's Current Procedural Terminology (CPT).

What term describes a dedicated device or computer that can control several printers connected to a network?

Answers

the answer is "server"

The number of pixels displayed on the screen is known as ________.

Answers

Resolution of the screen. Ex. 1366x768

Software that enables you to display and interact with text and other media on the web is a web ________.

Answers

It's a web site or web page

What is the best source for a complete listing of navigation rules that apply to recreational boaters?

Answers

The best source for a complete listing of navigation rules that apply to recreational boaters is the United States Coast Guard. The US Coast Guard is an uniformed service, part of the United States Armed Forces .The responsibilities of the US Coast Guard besides Aids to Navigation (ATON), are: Search and Rescue (SRA)   Environmental Protection, Maritime Law Enforcement (MLE),  Ice Breaking, Port Security and Military Readiness.

Write the definition of a class counter containing: an instance variable counter of type int, initialized to 0. a method called increment that adds one to the instance variable counter. it does not accept parameters or return a value. a method called getvalue that doesn't accept any parameters. it returns the value of the instance variable counter.

Answers

class Counter
{
   private:
      int counter = 0;
   public: 
      void Increment() { counter++; }
      int GetValue() { return counter; }
};


What containsthe computers brain the central processing unit (cpu)?

Answers

Central Processing Unit. The CPU (Central Processing Unit) is the part of acomputer system that is commonly referred to as the "brains" of a computer. TheCPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program.

What does most recent date of access mean?

Answers

Answer:

Explanation:

Date of Access. When creating a Works Cited citation for a website, the date you accessed the material should be included. Date of access is listed day, month, and year and is included at the end of the citation. Example: Antin, David.

The most recent date of access means the latest date at which any particular type of document or journal is accessible to the user.

What does the last access date mean?

The last access date means the specific date at which the records that have been terminated or restricted become generally available for use by the public. A timestamp that is typically associated with a file indicates the last time the file was viewed.

The portion of a bibliographic citation for a website indicates when the page, as cited, was known to be current. The date of Access indicates the date at which a specific type of document is framed. This creates works cited citations for a website. This last date of access or simply the access date is not a required element in your citation.

Therefore, the most recent date of access means the latest date at which any particular type of document or journal is accessible to the user.

To learn more about Accessing documents, refer to the link:

https://brainly.com/question/15011347

#SPJ2

Which type of software must include the source code, which allows programmers to modify and improve the software?

Answers

Hi there, 

The Open Source software type is the one that includes the source code and let the community improve the software's functionality.

Please check here in order to get a proper idea:
https://en.wikipedia.org/wiki/Open-source_software

Regards,
Alex

A ____ is an area in ram or on the hard drive designated to hold input and output on their way in or out of the computer system.

Answers

A buffer is a region in RAM or on the hard drive assigned to hold information and yield on their way in or out of the framework. In computer science , an information cushion or simply support is a zone of a physical memory stockpiling used to briefly store information while it is being progress starting with one place then onto the next. However, a buffer might be utilized while moving information between forms inside a PC.

To transfer data packets between two or more networks, a ________ is used.

Answers

To transfer data packets between two or more networks, a router is used. The router is a networking device that works on the OSI Layer 3 and is able to transfer and forward data packets between several networks. The router is capable of reading and using the source and destination IP address of the data packet, which defines the sender and the receiver of the packet. 

In nutanix command-line interface (ncli) commands, each entity has a unique set of actions, but a common action across all entities is:

Answers

In nutanix command-line interface (ncli) commands, each entity has a unique set of actions, but a common action across all entities is LIST.

This is how the Command Format Nutanix Command-Line Interface look like:

ncli> entity action parameter1=value parameter2=value ...

entity can be replaced by cluster or disk, both are Nutanix entities. Other Nutanix entities can also replace entity.
 
action can be replaced by any valid action for the preceding entity.

An example of a command requesting for a list of all storage pools in the cluster looks like this:  
ncli> storagepool list

Some action requires parameters to limit its scope. Thus, parameters are found at the end of the command. 

How to make the background bigger in photoshop?

Answers

Go to canvas size and change the lengths and everything

Answer:

2 Ways

Explanation:

Option A is to make the document bigger when starting, or if you want to zoom in or out on your canvas then hold down alt and scroll up or down on your mouse.

. The toasting cycle of an automatic toaster is started by A. pushing the bread rack down. B. pushing the start button. C. turning on the built-in switch. D. setting the thermostat knob.

Answers

In order for the toasting cycle of an automatic toaster to start, the bread rack should be pushed down.

Answer: A 

Hope that helps! ★ If you have further questions about this question or need more help, feel free to comment below or leave me a PM. -UnicornFudge aka Nadia
D. setting the thermostat knob.

Implement a function that meets the specifications below.

def max_val(t):
""" t, tuple or list
Each element of t is either an int, a tuple, or a list
No tuple or list is empty
Returns the maximum int in t or (recursively) in an element of t """
# Your code here
For example,

max_val((5, (1,2), [[1],[2]])) returns 5.
max_val((5, (1,2), [[1],[9]])) returns 9.
Paste your entire function, including the definition, in the box below. Do not leave any debugging print statements.

Answers

Final answer:

The 'max_val' function recursively finds the maximum integer in a tuple or list, which can contain nested lists or tuples. The function traverses all elements and sub-elements, updating the max_value when a larger integer is found.

Explanation:

To solve the problem given by the student, we need to write a recursive function that traverses through the tuple or list and finds the maximum integer value, whether it is directly within the tuple/list or nested inside another tuple/list. Here is how we can implement the said function:

def max_val(t):
   """ t, tuple or list
       Each element of t is either an int, a tuple, or a list
       No tuple or list is empty
       Returns the maximum int in t or (recursively) in an element of t """
   max_value = None
   for element in t:
       if isinstance(element, (list, tuple)):
           value = max_val(element)
       else:
           value = element
       if max_value is None or value > max_value:
           max_value = value
   return max_value

The function starts with setting max_value to None, then it iterates through each element in the given tuple or list. If the element is a tuple or list itself, it calls max_val recursively to find the maximum value within that sublist/tuple. Otherwise, it treats the element as an integer and compares it to the current max_value. At the end of the function, the highest integer found is returned.

You have a new web app and the host for its is going to provide storage for your data on thier server. what is this called

Answers

Cloud storage

Hope this help:)

True or False: If your driver license or license plates are suspended for not obeying either financial responsibility laws, you will not be able to get a temporary license for any reason, not even for work purposes.

Answers

Statement Is True.

Further Explanation:

The Financial Responsibility Law requires owners and operators of motor vehicles to be  financially responsible for damages and/or injuries they may cause to others when a motor  vehicle crash happens. This law requires any person to have bodily injury liability insurance at  the time of the following:

A Citation for DUI, which results in a revocation. These cases require the following minimum  insurance coverage

$100,000 Bodily Injury Liability (BIL) (to one person). $300,000 Bodily Injury Liability to two or more persons. $50,000 Property Damage Liability (PDL)

If your driver license or license plates are suspended for not obeying either financial responsibility laws,  you will not be able to get a temporary license for any reason, not even for work purposes. It is TRUE.

Description:

According to the law it proves that you have the required insurance. If you don't, you may  receive a citation for not having proof of insurance. If your driver license or license plates are  suspended for not obeying either of these laws, you will not be able to get a temporary license  for any reason, not even for work purposes.  You could not violate the law :

“You must maintain insurance coverage throughout the vehicle registration period or you  must surrender the license plate(s) to any driver license or tax collector office”.

Learn more:  

The two motor vehicle insurance laws in Florida are the financial responsibility law and the what

        brainly.com/question/10742151

Keywords: Financial Responsibility Law, insurance, BIL, PDL

Final answer:

If your driver's license or license plates are suspended for not obeying financial responsibility laws, you will not be able to get a temporary license for any reason, including work purposes.

Explanation:

If your driver's license or license plates are suspended for not obeying financial responsibility laws, you will not be able to get a temporary license for any reason, including work purposes.

Suspension of driver's license or license plates is a serious consequence for not complying with financial responsibility laws. This means that you are unable to legally operate a vehicle until the suspension is lifted.

To regain your driving privileges, you will need to address the reason for the suspension, pay any applicable fines or fees, and provide proof of financial responsibility to the proper authorities.

The phase of hacking where the attacker creates a profile of the target is known as ________________ and is also referred to as _______________.

Answers

The stage of hacking where the attacker constructs a profile of the target is recognized as Foot-printing and is also referred to as reconnaissance. Reconnaissance is perhaps the extensive phase that is occasionally weeks or months. The black hat uses a diversity of causes to learn as much as likely about the target business and how it functions as well as internet searches, social engineering, dumpster diving, domain name management or search services and non-intrusive network scanning. The undertakings in this phase are not easy to protect against. Facts about an organization find its method to the internet via many routes and employees are often trapped into providing tidbits data which over time, act to complete a complete picture of procedures, organizational arrangement and possible soft spots. 

There are three required elements needed to connect to the internet: internet service provider, hardware, and __________.

cache
cross-platform capability
extranet
web browser

Answers

A web browser is needed to connect to the internet

The answer is definitely D: A web browser

To connect to the internet, you need the following things: A computer which comes with an operating system, Hardware (a modem or router supplied by the ISP), the ISP itself, and client software (the web browser). These things work together. Browsers get web pages and display them on your computer. It is the tool used to access the World Wide Web. The web browser itself is not the internet, it only helps you connect and view websites.  



When you click blank document in the start screen, the start screen closes and a new blank document appears on screen in the word app window?

Answers

yes it would but the start screen would still be open for windows 10

A(n) _____ can be used to reveal a competitor’s program code, which can then be used to develop a new program that either duplicates the original or interfaces with the program.

Answers

The answer to the above question is a decompiler would be used for that application. Decompilers use executable file as input. They then create a source code that can be recompiled and put back together fairly easily. Due to a decompilers ability to break down original code, that original code can then be used to either duplicate the program, or re-engineer a program that would work in concert with the original program.

Quiz 2: a _____ is any computer that provides services and connections to other computers on a network.

Answers

The answer could be "server"

A utility program that copies all files in the libraries, contacts, and favorites and on the desktop:

Answers

A collection of related pieces of information stored together for easy reference.
If my memory serves me well, a utility program that copies all files in the libraries, contacts, and favorites and on the desktop is called File History. Every operating system including Linux and Chrome OS has this kind of utility to maintain files in the clipboard. 

In windows xp, which control panel icon should you choose if you would like to customize your system for left-handed use?

Answers

Hello,
Once you’ve opened the Control Panel click on: the Mouse icon. Aslo you could click on: the Accessibility icon to setup your system for left handed use.

I hope this helps you out. If you need any more computer help, your more than welcome to contact me at:
helpdesk2572@comcast.net

In Windows XP, which Control Panel icon should you choose if you would like to customize your system for left-handed use?  

   

  A. Keyboard

  B. Regional and Language Options

  C. Add or Remove Programs

  D. Mouse

The correct answer is D. Mouse

"using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer."

Answers

Broadband is a communication channel in which several users can simultaneously use a single connection for high-speed data transfer. The broadband communication channel has wide bandwidth, which means that it can transport data with high rates.  It is referred as high-speed Internet access and provides data transmissions in different directions and by many different users.

A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.

Answers

The answer to this question is a firewall. A Firewall is a network security system that blocks and prevent unauthorized use or access of company’s network. Firewall is also a program that screens and restricts viruses and other users like hackers to reach the network through the internet. 

How many buttons does a gamecube controller have?

Answers

a gamecube has 11 different buttons on a controller.

Answer:

6

Explanation:

If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.

Answers

This question, in it's raw form suggests that it is about information security -  in this case, password. There are several ways to make the password more challenging to hack. It's either make it encrypted or make/own a key-gen or key generator.

Key generator -  a key generator generates random characters which can be used as a password. It's effectivity lies on the number of characters used.

The answer for this question is none other than: Key-gen or key geneator.

Who can effectively use website authoring software?

Answers

Final answer:

Website authoring software can be effectively used by individuals who want to create and design websites. Applications like Dreamweaver or FrontPage provide a visual interface, while hand-coding with HTML is another option for more experienced users.

Explanation:

Website authoring software can be effectively used by individuals who want to create and design websites. These tools provide a user-friendly interface that allows users to easily create webpages without extensive coding knowledge.

For example, applications like Dreamweaver or FrontPage provide a visual interface where users can drag and drop elements to design their websites. Hand-coding a webpage using HTML is another option for more experienced users who have a deeper understanding of web development.

All gasoline inboard engines must have a backfire flame arrestor on each carburetor. what does this device prevent

Answers

All gasoline inboard engines must have a backfire flame arrestor on each carburetor. This device prevents the ignition of gasoline vapors in case the engine backfires. The backfire flame arrestor must be checked regular, be in good condition and be approved by the United States Coast Guard.
Other Questions
What is the inverse of y equals x squared + 2 The ________ is (are) the organ in which the exchange of nutrients and waste takes place A student makes the analogy that the cardiovascular system is like a highway. Why is this a good analogy? estimate 17.58.4 need help propose three ways in which the government can ensure that the help it offers is received only by the people who are in need The linear function y = 1.2x represents Albertos speed, y, in meters per minute, when his stride rate is x steps per minute. Albertos average stride rate during a 10-kilometer race is 180 steps per minute. What is Albertos average speed during the race? Samantha wants to use her savings of $1150 to buy shirts and watches for her family. the total price of the shirts she bought was $84. the watches cost $99 each. what is the maximum number of watches that samantha can buy with her savings? (1 point) Read the passage from I Know Why the Caged Bird Sings. Mrs. Bertha Flowers was the aristocrat of Black Stamps. She had the grace of control to appear warm in the coldest weather, and on the Arkansas summer days it seemed she had a private breeze which swirled around, cooling her. She was thin without the taut look of wiry people, and her printed voile dresses and flowered hats were as right for her as denim overalls for a farmer. She was our side's answer to the richest white woman in town. The authors purpose in including this passage is to explain to the reader the way people dressed in Black Stamps. instruct the reader on the local customs in Black Stamps. inform the reader of Mrs. Flowerss social position in Black Stamps. teach the reader how Mrs. Flowerss fashion affected Black Stamps. At the age of 15 months, anita repeatedly cries hoy when she wants her mother to hold her. anita is most likely in the ________ stage of language development. How does a plant benefit from mycorrhizae? A normal concentration of glucose, or sugar, in the blood is 95 mg/dl. how many grams of sugar would be present per liter of blood? show the conversion factors you use. Decide if the problems are parallel,perpendicular or neithet and why1).12x-4y=82).3y=-x+53).y=1/3x-54).12x-10=4y5).2/3+2y=8 What is the value of the 30th percentile for the data set 6283, 5700, 6381, 6274, 5700, 5896, 5972, 6075, 5993, 5581? One pound of feathers would be easier weighing than one pound of iron Conflict theorists assert that it is the imbalance of power that leads to deviance, and the more powerful in a society are able to criminalize behavior through the use of norms, rules and laws. this process is a form of what? What's is a typographical clue Discuss the difference between chronic and acute pain 20. Archetypes are a type of _______ that appear throughout history.A. motifB. prototypeC. foreshadowingD. subgenreStudent Answer: A Answer: IncorrectAnswer is B Prototype (WILL GIVE BRAINLIEST AND THANKS) Where on Earth's surface might you be if you are experiencing the trade winds? Explain how air pressure, temperature, and the Coriolis effect in movement and direction of thesewinds. Je suis petite et pratique. Tu peux jouer des jeux et tu as des applications dessus. Je suis moins chre qu'un ordinateur portable. Je suis une ________________. Steam Workshop Downloader