10 POINTS!! Picture below: NOT A QUIZ

10 POINTS!! Picture Below: NOT A QUIZ

Answers

Answer 1

Answer:

a. Windows Photo Viewer: PNG

b. MS Word: DOCX

c. MS Excel: XLS

d. Go-ogle Chrome: HTML

e. MS PowerPoint: PPT

Explanation:

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

Generally, all files are identified by a name and type such as audio, image, video, document, system, text, etc.

On a related note, all software applications (programs) are designed and developed for use with specific file extensions or formats and as such, when a particular software is used to open a file it isn't developed for, it result in an error.

a. Windows Photo Viewer: PNG. This software application is specifically designed for viewing images (photos) which could either be in a PNG or JPEG format.

b. MS Word: DOCX. Microsoft (MS) Excel is a word processing software application (program) developed by Microsoft Inc. to enable its users type, format and save text-based documents with a DOC or DOCX file extension.

c. MS Excel: XLS. Microsoft (MS) Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents having a XLS file extension.

d. Go-ogle Chrome: HTML. HTML is an acronym for hypertext markup language and it is a standard programming language that is used for designing, developing and creating web pages. Go-ogle Chrome is a web browser designed for browsing websites or opening HTML files.

e. MS PowerPoint: PPT. Microsoft (MS) PowerPoint is a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.


Related Questions

Write an algorithm to convert lengh of your house from cm to meter​

Answers

Answer:

cm = 1000;

 

meter = cm / 100.0;

kilometer = cm / 100000.0;

 

print("Length in meter = " ,

              meter , "m");

print("Length in Kilometer = ",

            kilometer , "km");

Explanation:

This is in Python, hope you enjoy!

Someone knows a good compiler for iPad? It has to be an app

Answers

Jedona is a good one

Online retailers can and should encourage every customer to sign up for regular emails from the retailer. To avoid spam filters, retailers should Group of answer choices automatically send regular emails to all customers send emails to all customers except those who request to be taken off the email list provide a check box that is checked by default during the checkout process for customers to sign up for emails provide a check box that is unchecked by default during the checkout process for customers to sign up for emails ANS:DPTS:1

Answers

Answer:

Provide a check box that is checked by default during the checkout process for customers to sign up for emails

Explanation:

I've seen this used the most so I would go with this answer.

The way online retailers get you is by showing you a prechecked email subscription with an unchecked TOS agreement. Your attention is then focused on the TOS agreement and not the agreement for promotions sent to you via email.

30points!!!! Plz answer quickly
Select the correct answer.
What should be the ideal position of the image in a video if it is the main feature of the video?
A. bottom
B. right
C. left
D. center

Answers

Answer:

center

Explanation:

that is the focal point

Answer:

D

Explanation:

since it's the main feature of the video it would be best to put it on the center so that all focus is on it because if you put it in the corner or another position it won't be the main feature and definitely not the center of attraction.

I hope you understand.and sorry if it's wrong

what is the difference between b and br tag​

Answers

Answer:

<b> tag is used to make the text bold. <br> tag is used to insert a line break into a text font.

Explanation:

The <b> tag in HTML is used to indicate the importance of the text. The text is written within <b> tag display in bold size. You can do that by using CSS also there is a similar tag <strong> tag that has a similar effect on content.

The <br> tag inserts a single line break. The <br> tag is useful for writing addresses or poems. The <br> tag is an empty tag which means that it has no end tag.

The HTML tag for the smallest heading is​ what​

Answers

Answer:

The HTML <h1> to <h6> tag is used to define headings in an HTML document. <h1> defines largest heading and <h6> defines smallest heading.

Explanation:

BIOS has two jobs. One is to boot up, or start, the computer. What is the other? Maintain the computer’s software firewall. Ensure the fastest possible Internet speed. Provide the basic interface for the hardware. Perform regularly scheduled memory backups.

Answers

Answer:

Provide the basic interface for the hardware.

Explanation:

A is a distinctive characteristic of a virus or virus family.

Answers

Answer:

Assuming your talking about a computer virus(because your under the Computers and Technology section)

Also assuming you meant "What is a distinctive characteristic of a virus or virus family."

A computer virus is a software that was created with the intent of damaging a computer. Computer viruses can replicate them selves by modifying other software on the computer. Viruses such as file infectors can override the machine code of another application and inject its own malicious machine code to perform malicious acts. This is especially dangerous for the OS as the virus can override essential files.

Explanation:

You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. The auth.log file is a plain text, file so you decide to use the cat command to review the file. However, the display fills with text for several pages, and you can't see the entire file. What commands can you use to view the content of the auth.log file page by page? (Select TWO).

Answers

Answer:

more /var/log/auth.log

less /var/log/auth.log

Explanation:

The commands that can be used to view the content of the auth.log file page by page are:

more /var/log/auth.log

less /var/log/auth.log

Which unit of computer is used to processed data?​
Please help!!!!!!

Answers

[tex]Hello[/tex] [tex]There![/tex]

[tex]AnimeVines[/tex] [tex]is[/tex] [tex]here![/tex]

Is it Central Processing Unit?

[tex]HopeThisHelps!![/tex]

[tex]AnimeVines[/tex]

Answer:

Central Processing Unit (CPU)

Explanation:

The Central Processing Unit (aka CPU), is used to process the data.

Which tab on the ribbon is used to access the global Access 2016 options?

Home
Create
Database Tools
File

Answers

Explanation:

the answer is Database Tools

How many characters should a strong password have? four six eight ten

Answers

Answer:

I say it have to be aleast 8 to complete a strong password

Explanation:

it's common sense

Answer:

8

Explanation:

The more the better but ten too much

Which option is used to insert a table in PowerPoint from another Office application?

In the Insert Object dialog box, choose Create from file.
In the Design tab, choose the Table Styles option.
In the Insert Table dialog box, choose Insert Table.
In the Layout tab, choose the Merge option.

Answers

Answer: In the Insert Object dialog box, choose Create from file.

Explanation:

To insert a table into PowerPoint from another Office application, go to the Insert Tab. In the Text ribbon on the far right, you will see "Object" next to Equation.

After clicking on that, select the "Create from File" option. It will allow you to browse a file you want to import from. PowerPoint will import the data from this file.

Hoda needs to create a chart that is associated with an Excel spreadsheet. She needs to ensure that if the data in the spreadsheet changes, the chart in her presentation will be updated. Which option must she choose?

Embed the chart.
Link the chart.
Insert the chart as a picture.
This cannot be done.

Answers

Answer:

the awnser is B

Explanation:

Answer:

B, Link the chart.

Explanation:

Spreadsheet allow three types of cell addressing. They include ______addresses, such as $E$1, ______addresses, such as R$3, and ______addresses, such as D4.

Answers

Answer:

The answer is below

Explanation:

Based on the Microsoft Excel Formatting style, Spreadsheet allows three types of cell addressing. They include:

1. ABSOLUTE CELL ADDRESSING addresses, such as $E$1,

2. MIXED CELL ADDRESSING addresses, such as R$3, and

3. RELATIVE CELL ADDRESSING addresses, such as D4.

cual es el procedimientos para asistir en el transporte publico a personas discapacitadas

Answers

Answer:

Una discapacidad física o motora en una o más partes del cuerpo obstaculiza las acciones y / o movimientos de la persona con discapacidad. La discapacidad puede surgir porque las partes del cuerpo no han crecido completamente o están dañadas (anomalías físicas) o porque las funciones físicas están alteradas (anomalías funcionales).

En la mayoría de los casos, se proporciona una ayuda a las personas con discapacidades físicas graves para que puedan desenvolverse más fácilmente en la sociedad. Alguien con una discapacidad motora severa en las piernas a menudo usa una silla de ruedas. Las personas con una discapacidad motora de las manos (pérdida de la motricidad fina) o de los brazos pueden compensar esto con un manipulador o ayudas especializadas en tareas, como un dispositivo para comer o un dispositivo para girar las hojas.

Así, todos estos elementos deben ser posibles de ser insertados en los medios de transporte público como forma de ayudar a estas personas a trasladarse por estos medios, es decir, los autobuses, trenes, etc., deben estar adaptados para poder recibir allí a pasajeros en sillas de ruedas o con necesidades motoras especiales.

What is binary number system? Why is it used in computer system?

Answers

Answer:

Computers depend mainly on binary because it’s more time efficient for them to so.

Explanation:

It’s easier to identify 0 as “off” and 1 as “on”. As you may know, transistors are the fundamental blocks of microprocessors and ICs. The reasons this is the case is that these transistors form logic gates which can carry out basic logic operations. These logic gates are a huge step into making microprocessors/ICs/etc. And what do these logic gates depend on? They depend on binary.

Whoa whoa, wait a minute. Let’s first take a step back to know a thing or two about logic gates.

These logic gate can be constructed from transistors. They carry basic logic operations. You have one or more inputs “entering” the logic gate ——-> A certain operation is performed on them ——-> you get your output. The input is a voltage. This voltage it can be interpreted as an “on” or “off” according to the gate. Once again these offs and ons are 0s and 1s. For example the Inverter/NOT gate is a gate that simply takes an input and gives its inverse. For example:-

A low voltage/an “off” signal/ a “0” “enters” the NOT gate. ——-> A high voltage/an “on” signal/ a “1” is the result of the operation performed

(In the above example low voltage = “off” signal = 0, high voltage = “on” signal = 1)

As you can see, a 0 enters the NOT gate and a 1 comes out or vice versa. Now, if you were a logic gate, you’d prefer working with just 0s and 1s right? I would. This would be much easier to work with than a lot of different values.

It’s a herculean task to work with these though as a human. And fortunately, programming languages exist for giving the computer instructions to do in a “language” other than its own.

I nut bun is how binary liks bavlls

Audience centered public speakers are inherently sensitive to the

Answers

diversity of their audiences

Answer:

the diversity of their audiences

Explanation:

Suppose you are given a sequence that is described by a formula, starting at index n=0. If you need to change the starting index to n=1, then you just need to replace n in the formula by n+...?

Answers

Answer:

[tex]n+1[/tex]

Explanation:

Given

[tex]n = 0[/tex] --- starting index

Required

Change the starting index to [tex]n = 1[/tex]

We have:

[tex]n = 0[/tex]

To change the starting index to k, we simply rewrite as:

[tex]n+k[/tex]

In this case; k=1; so, the starting index will be: [tex]n+1[/tex]

Select three physical forms of storage. USB drive Primary cache Magnetic storage Secondary cache Dynamic RAM Optical drive

Answers

Answer:USB drive

Magnetic storage

Optical drive

Explanation:

hope this helps

The CPU is considered to be the............of a computer system​

Answers

Answer:

The Central Processing Unit (CPU) is the brain or main source of the computer system.

The most likely reason a firm would decide to establish an extranet would be the desire to Multiple Choice speed the flow of information on its private network by increasing the bandwidth. make the information on its network widely available to the general public. share information and collaborate with a select group of outside organizations or individuals. overcome the speed and capacity limitations of its external connection to the Internet by gaining access to the very-high-speed Backbone Network Service.

Answers

Answer: share information and collaborate with a select group of outside organizations or individuals.

Explanation:

When a company uses an intranet, it is for the purpose of sharing information within the company so in the same vein, an extranet is done to share information with entities outside the company be it people or organizations.

For information to be shared, the other companies and organizations need to have the means and authorization to join the extranet. Extranets are very useful as they enable collaboration across vast distances thereby increasing productivity.

The most likely reason a firm would decide to establish an extranet is B. share information and collaborate with a select group of outside organizations or individuals.

An extranet simply means a controlled private network that allows customers, vendors, partners, suppliers, etc to gain information about a company.

Extranet is vital to share information and collaborate with a select group of outside organizations or individuals. It is usually a private part of a website.

Read related link on:

https://brainly.com/question/10156285

write chracteristics of all 5 generation of computer​

Answers

Answer:

First generation — 1940–1956

-used vacuum tubes

ENIAC, UNIVAC I, IBM 650, IBM 701 etc.

mainframes taking up entire rooms

punched cards I/O

electrostatic and mercury delay line memory, beginning use of core

Second generation — 1956-1963

-used discrete transistors

IBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.

first appearance of minicomputer (PDP-8)

punched cards I/O and line printers (mainframe), TTY (minicomputers)

core memory, magnetic tape for mass storage

Third generation — 1964-1971

-used integrated circuits

IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.

mostly same I/O and memory as second generation

Fourth generation — 1971-present

-use microprocessors

PDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.

transition from minicomputers to personal computers

video terminals used for I/O, specialty computer printers developed

fewer mainframes

semiconductor memory replaces core memory

hard drives and optical drives replace magnetic tape for mass storage, followed by solid-state drives (SSD)

Fifth generation — (current research)

-artificial intelligence and quantum computing

Answer:

The five generations of computer are characterized by electrical current flowing through the processing mechanisms listed below : The first within vacuum tubes The second within transistors The third within integrated circuits The fourth within microprocessors clips The fifth unveiled smart devices capable of artificial...

Explanation:

hope it is helpful to you

MiraculousNisha^_^

Create a program that uses a separate module to calculate sales tax and total after tax.

Create a c++ program using console.h and console.cpp files that uses a separate module to calculate sales tax and total after tax.

Console

Sales Tax Calculator

ENTER ITEMS (ENTER 0 TO END)

Cost of item: 35.99

Cost of item: 27.50

Cost of item: 19.59

Cost of item: 0

Total: 83.08

Sales tax: 4.98

Total after tax: 88.06

Again? (y/n): y

ENTER ITEMS (ENTER 0 TO END)

Cost of item: 152.50

Cost of item: 59.80

Cost of item: 0

Total: 212.30

Sales tax: 12.74

Total after tax: 225.04

Again? (y/n): n

Answers

Answer:

I nor know this one oo abeg sorry

explain the tearms alink and vlink​

Answers

Answer:

The alink (active link) color appears while the mouse is clicking the link. The vlink (visited link) is the color of the link after the user has already visited it.

A company has enlisted the help of TDojo Consulting Co. to assist them in designing an AWS disaster recovery solution for their on-premises bare metal servers and SQL databases. The implementation has to be robust, fast, and simple to use. It should also prevent any type of data loss from occurring. The company would like to keep track of the status of the migration. Which tool should the team adopt for the DR solution

Answers

Answer: CloudEndure Disaster Recovery

Explanation:

The tool that the team should adopt for the DR solution is the CloudEndure Disaster Recovery.

CloudEndure Disaster Recovery is the tool that helps in minimizing downtime and data loss through the provision of a fast and a reliable recovery of the servers into the AWS Cloud.

It also allows the user recover the environment from an unexpected infrastructure, data corruption, or malicious attacks.

Select the item that best represents technology transfer?
Newtonian telescope
Magnetic Compass
Printing Press

Answers

Answer:

Printing Press

Explanation:

Technology transfer is the simple process of sharing or dissemination of information from person to person (or from one organisation to another)

Therefore, the item that best represents technology transfer from the given answer choices is the printing press.

This is because, the printing press helped to print paper containing information which was sent from one location to another.

1. Read the following scenario. What type of business letter do you think is required in this situation? (1 point)
Melissa and Melrose are both first-year students at a local community college. They both have interest in volunteering with a nonprofit organization. They decided to reach out to nonprofit organizations to ask about the steps they need to take in order to volunteer.

Answers

Answer:

It requires a formal letter.

Answer:

This would require a formal business letter, the type being a cover letter or inquiry.

Explanation: yes

A driver that approaches a controlled intersection with a signal that is not working must:

Answers

You must stop at the intersection and proceed when you are aware that other turning or approaching vehicles,bicycles or pedestrians have stopped.

A specified group of banks get together and agree to use a blockchain for wholesale settlement of interbank transfers. This is most likely an example of a ........................ blockchain. Group of answer choices Permissionless Permissioned

Answers

Answer:

Permissioned

Explanation:

In this scenario, specified group of banks got together and joined forces by agreeing to use a blockchain for wholesale settlement of all interbank transfers. Thus, this is most likely an example of a permissioned blockchain.

Other Questions
Which of the following is an advantage to having the European Union remain a confederacy of states? A. Passport-free travel between member statesB. A variety of currencies C. The same laws in every countryD. A strong economy for all member states g A small object of mass 2.5 g and charge 18 uC is suspended motionless above the ground when immersed in a uniform electric field perpendicular to the ground. What is the magnitude and direction of the electric field suggest a measure to increase the number of skilled human resources though the place is.... now it is become very touristy.a. a lot much expensiveb. a lot expensivec.a lot more expensived. a lot much many expensive Find the geometric mean of 5/6 and 1/2. What is the equation of the following line? Be sure to scroll down first to see all answer options. A. y = 18x B. y = 9x C. y = -9x D. y = - x E. y = -18x F. y = x can u help me on this... I will mark u as brilliant students.. plz 1. Answer the following questions: a. What are the different types of number system? Name them. Primo car rental agency charges $21 per day plus $0.20 por milo. Ultimo car rental agency charges $24 per day plus $1.00 per milo. Find the daily mileage for which the Ultimo charge is four times the Primo charge.The mileage is If the temperature of a reversible reaction in dynamic equilibrium decreases, how will the equilibrium change?A. It will shift towards the endothermic reaction.B. It will not change.C. It will shift towards the products.D. It will shift towards the exothermic reaction. Chris is saving for a down payment to buy a house. The account earns 3.9% interest compounded semi-annually, and he wants to have $8,000 in 10 years. What must his principal be? Round your answer to the nearest cent. Do not round at any other point in the solving process; only round your answer. Ed takes five 100-point tests in his algebra class. He scores 87, 85 and 87 points on the first three tests. If the scores of his last two tests differ by three points and he has a 90% average on his five tests, what was his highest test score?PLS ANSWER QUICK WILL GIVE BRAINLIEST all I've found is 1 but how do I work that out properly beaides guess and check Salaries of entry-level computer engineers have Normal distribution with unknown mean and variance. Three randomly selected computer engineers have following salaries (in $1000s): 70, 80, 90. The average and the standard deviation of the data in the sample are 80 and 10. Using hypothesis testing, determine if this sample provides a sufficient evidence, at a 10% level of significance, that the average salary of all entry-level computer engineers is different from $60,000.a. Null hypothesis.b. alternative hypothesis.c. test statistic.d. acceptance region. "three times the difference between t and y"? I need two people to help me brainliest. HELP!!!!! Substance A and substance B are mixed together. To separate the mixture, water is added, and substance A is filtered out. Then, the remaining liquid is heated to remove the water, leaving a residue of substance B. Which statement about substance A and substance B could be correct?A. Substance A is rice, and substance B is sugar.B. Substance A is alcohol, and substance B is salt.C. Substance A is sand, and substance B is alcohol.D. Substance A is sugar, and substance B is instant coffee. A bicyclist is at point A on a paved road and must ride to point C on another paved road. The two roads meet atan angle of 38 at point B. The distance from A to B is 18 mi, and the distance from B to C is 12 mi (seethe figure). If the bicyclist can ride 22 mph on the paved roads and 6.8 mph off-road, would it be faster for the bicyclist to ride from A to C on the paved roads or to ride a direct line from A to C off-road? Explain. discuss two concerns regarding funeral restrictions that your community complain about lock 2. Solve the following system of equations. y = 5 + x 2x + 2y = 30