The stereotypical e-reader uses a low-power _______________ screen technology called e-paper.

A. OLED
B. virtual
C. digitized
D. grayscale


Answer: D

Computer Science & Information Technology

You might also like to view...

Match the term with the correct item below. (Not all terms are used.)

A. A _______________ is provided to a potential employer to assist in checking your qualifications. B. C. A resume in a Word document attached to an e-mail is an example of a(n) __________. D. A keyword search uses  __________ to match keywords. E. F. G. H. To determine the specific qualifications required for a job that is available, review the  __________. I. A(n) __________ is used to determine which companies may be the best prospects for your job search. J.

Computer Science & Information Technology

Which of the following is a program or set of instructions in a program that allows users to bypass security controls?

A. keygens B. indices C. rootkit D. back door

Computer Science & Information Technology

The process of recovering unused space in a database is known as ___ the database.

A. backing up B. validating C. compacting D. populating

Computer Science & Information Technology

Describe business situations in which an individual’s or businesses’ behavior would be considered:

What will be an ideal response? (a) illegal and unethical; (b) legal but unethical; (c) illegal but ethical.

Computer Science & Information Technology