Which file types have exe and png as their extensions?

Answers

Answer 1

Answer:

PNG are for photos and exe are for programs

Answer 2

Answer:

exe are executable files or it could also be applications.

png are pictures or photos that you get from the internet when you use the save as option on your computer.

Explanation:

None.


Related Questions

how do you open cosh

Answers

Answer:

Hit the cosine button on the calculator

Explanation:

HELP 20 points THIS IS ON EDGE IF YOU DON'T KNOW THE ANSWER DON'T RESPOND
Directions
In this assignment, you'll use a word processor to create a newsletter.

Choose from one of the following topics for your newsletter:

Science project
Science report
State report
Country report
Biography
Your newsletter should meet these requirements:

Fill one page.
Include the following:
two or three columns
a title
at least three graphics, but not more than six
When you've finished creating your newsletter, remember to spell check and proofread. Then save your newsletter and upload it.

Question # 1
File Upload
Submit your newsletter that includes the following:

two or three columns
a title
at least three graphics, but not more than six

Answers

Column One: Who was Henry Ford?

            Henry Ford was the founder of Ford Motor Company and also the mass producer of the automobile. Henry Ford was born in 1863. At the age of 16, he worked as a machinist apprentice. Later, Henry began to work the family farm while still working on creating steam engines. Henry had a big interest in steam engines, which would later contribute to him building his first working automobile.

Column Two: How did Henry Ford contribute to our society?

           After marrying in 1888, Ford was hired to work for Edison Illuminating Company. His position was an engineer, and Ford began to accelerate his position in the company quickly. After a while, Ford created his first operating vehicle. This was called the "Quadricycle." Ford wanted to improve on his models, so he founded the Company Ford with others. Ford then began to develop methods of mass-producing automobiles to sell to the public. After success in business, he bought the whole company and owned it all by himself. Ford began to mass-produce automobiles. It is said that " The mass production techniques Henry Ford championed eventually allowed Ford Motor Company to turn out one Model T every 24 seconds." Ford passed away in 1945. He decided to give ownership to his son Edsel Ford before he died, but Edsel sadly died before Henry Ford. The Ford company's ownership was given to Ford's grandson, Henry Ford II.

Please re-word so it isn't plagerized

write a q basic program to find the sum of all the even numbers from 1 to 50​

Answers

Answer:

CLS

M=2

SUM=0

DO WHILE M<=50

SUM=SUM+M

M=M+2

LOOP

PRINT " The sum of all even numbers between 1 and 50 is"; sum

Which protocol is responsible for transporting files between a client and a server?

HTTP
FTP
LLP
TCP

Answers

Answer:

FTP

Explanation:

FTP stands for File Transfer Protocol.

Pls answer i will give 20 points

Answers

Answer:

Penicilium roqueforti

what actions can be performed via voice commands using 2022 sentra’s siri® eyes free?

Answers

New mobile cars produce nowadays often have new features that follows it. The actions that can be performed via voice commands using 2021 Sentra's Siri® Eyes Free are;

Send and receive text messages

Make and receive calls

Select and play music

Siri® Eyes Free command can be used to play music, report on the news, show  movies, play games, and give us navigation from one place to the other.

It ha been made available in some selected cars and it often use one's voice to control features of your iPhone without viewing or touching the phone.

Learn more from

https://brainly.com/question/13429053

Why is it important to select appropriate software?

Answers

Explanation:

because the software is the being practical for the computer programming into the software

Because it affects production quality and quantity and they cost a lot of money

10 computer and operating systems errors​

Answers

Answer:

what is

Explanation:

Answer:System errors are caused by malfunctioning hardware components, corrupted operating system modules, etc. These are caused by corrupted or malfunctioning system files or software executables. Most runtime errors affect the application that caused it to shut down.

Explanation:

please help me I have 5 mins ​

Answers

Answer:

Question 3 is c. (==). Question 2 cut off.

Explanation:

I can't read the full thing, so please comment here the full question for number 2, I'm waiting for your response.

Answer: what he said is true that's what i was going to say.

Explanation:

A type of user interface that features on- screen objects, such a menus and icons, manipulated by a mouse.

options:

GUI (Graphical User Interface)


Sticky


Circuits


RAM

Answers

Explanation:

What want help with i just see answer there maybe if you want to know the meaning of Gui it is : A graphizal user interface (GUI) is a type of user interface through which users interact with electronic devices via visual indicator representations.

and next time please make yourself clear with your sentence no Offense

Please help, no links.

Answers

Explanation:

1gigabyte= 1000kilobytes

Answer:

1st one - 2; 2nd - 1; 3rd -3

Explanation:

compare the four ways of regulating the internet​

Answers

Answer:

the four is all the same way that can harm people through the internet

Explanation:

25 points select 3 options!!!!!!!!!!!!!!!!!!!!!!!!!
Some disadvantages of ethical codes are that _____.

!!!!!!!!!!Select 3 options!!!!!!!!!!!!!!

A. there is no legal authority to prosecute offenders

B. the code is broad enough to cover all issues

C. people can abuse intellectual property law

D. the ethical code can be changed at anytime

E. specific details are not covered in the code

Answers

Answer:

Some disadvantages of ethical codes are that _____.

Answers:

specific details are not covered in the code

there is no legal authority to prosecute offenders

people can abuse intellectual property law

Ex:

Got it right on my assignment.

Answer:Below

Explanation:

How Powerpoint is useful in education aspect?

Answers

Answer:

(Hope this helps can I pls have brainlist (crown)☺️)

Explanation:

PowerPoint may be a useful tool in the classroom for presenting content and encouraging student learning. PowerPoint may be used to present graphics that would be difficult to bring to class otherwise. PowerPoint may be a useful tool in the classroom for presenting content and encouraging student learning.

It improves learning by giving pupils a greater comprehension of the subject and inspiring them. It meant that technology-based instruction had a considerable favourable impact on students' grades. Analyses revealed that the experimental group students outperformed the control group.

your network settings prevent content from loading privately

Answers

Answer:

what what what what what what

Unit 2: Lesson 6 - Coding Activity 1
Write code which takes inputs from the user for the number of sides (int) and side length (double), then creates a regular polygon with these characteristics. The program should then print a sentence with the name of the shape and the area and perimeter as shown in the sample run. You should use the appropriate RegularPolygon methods to obtain the perimeter and area of the shape rather than attempting to calculate these values yourself.

Sample run:

Enter number of sides:
> 5
Enter side length:
> 3.5
A regular pentagon with side length 3.5 has perimeter 17.5 and area 21.075848157214846
Hint: You can approach this problem by saving the int and double as variables, and then creating the RegularPolygon, or you can create the polygon and use methods to set the values of the sides and sidelength.

Answers

Answer:

easyy

Explanation:10 smaple runs and 2

The motherboard is the computer's main circuit board. This board holds the CPU, memory, connectors for the hard drive.

options:
True
False

Answers

True it is the main part of a computer
this is true i believe.. . . .. .

A collection of programs or tools that give cybercriminals complete control over a computer or a network of Internet-connected devices.

Answers

Answer:

Acunetix. Netsparker. Intruder. Nmap. Metasploit. Aircrack-Ng. Wireshark.

A lot of these software are used in Kali Linux. I hope it helped. :)

the term __________ refers to the expression that defines the quantity to be maximized or minimized in a linear programming model.

Answers

The answer is: objective function.

the term “objective function” refers to the expression that defines the quantity to be maximized or minimized in a linear programming model.

the term objective function refers to the expression that defines the quantity to be maximized or minimized in a linear programming model.

What is objective function?

The objective function is a mathematical equation that describes the target production output that corresponds to profit maximization in relation to production.

It then uses the correlation of variables to calculate the final outcome value. Based on a collection of constraints and the relationship between one or more decision variables, an objective function attempts to maximize profits or minimize losses.

Therefore, In a linear programming model, the term objective function refers to the expression that defines the quantity to be maximized or minimized.

Learn more about the objective function, refer to:

https://brainly.com/question/29185392

#SPJ5

Select the correct answer.

What does the term “framing” mean in cinematography?

A.

placement of the hand props in relation to the other objects appearing on the screen

B.

placement of the main subject in relation to the other objects appearing on the screen

C.

placement of the main subject in relation to the hand props appearing on the screen

D.

placement of the camera in relation to the lights present on the set

Answers

Answer:

Explanation:

D

Answer:

placement of the main subject in relation to the other objects appearing on the screen

Explanation:

it's literally in the notes

What value is displayed as a result of executing the code segment?

Answers

Answer:

A: 3

Explanation:

The MOD operator is used to calculate the remainder of dividing two numbers, so by the end of this operation, we are adding the MODs of each integer in this list, because this program ends once each integer in list has gone through the steps, and the result of calculating the MOD of each integer is then added back because of the third step. So it should look like this: (4 MOD 2) + (2 MOD 2)...(1 MOD 2) and the result of adding these values should then result in 3.

The value which is displayed as a result of executing the code segment is equal to: A. 3.

What is MOD?

MOD is an abbreviation for modulo operation and it can be defined as a mathematical technique that is used in computer science to determine the remainder of an arithmetic operation such as the division of two numbers.

Based on the code segment, the value which is displayed as a result of executing the modulo operation would be equal to 3 at the end of the iteration or operation.

Read more on computer codes here: brainly.com/question/25619349

Which Operating System is used most often in households?

options:

WIndows


MAC OS X


Linux

Answers

Answer:

Windows

Explanation:

Windows are one of the most popular household os.

Windows because there are way more pc then Mac

PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS

Answers

Answer:

span > : A generic container that can be used for styling specific portions of text.

Memory containing hardwired instructions that the computer uses when it boots up, before the system loads. In PCs the instructions are read from a small program in the read only memory, called the Bios.

options:

RAM


ROM


Processing


Flash drive

Answers

Answer:

Rom

Explanation:

ROM is memory containing hardwired instructions that the computer uses when it boots up, before the system software loads

 drag the tiles to the correct boxes to complete pairs match the graphic design tool to its purpose/definition

Answers

Answer:

1, layers

2. lasso

3.Drawing

4. magic wand

Explanation:

trust

Which one is called the Information Super Highway? a. E-mail b. Mobile phone c. Internet d. Land phone

class 6 ​

Answers

Answer:

c

Explanation:

Answer C
Explanation:

Helppppppppppppppppppp

Answers

1. a
2. e
3. c
4. b
5. d
i think this is right, i hope it helps :)

short note about light pens​

Answers

Answer: A light pen is a computer input device in the form of a light-sensitive wand used in conjunction with a computer's cathode-ray tube (CRT) display. It allows the user to point to displayed objects or draw on the screen in a similar way to a touchscreen but with greater positional accuracy.

Explanation:

What is gaining of unauthorized access to data in a system or computer

Answers

Answer:

when a person who does not have permission to connect to or use a system gains entry in a manner unintended by the system owner. The popular term for this is “hacking”. so they are doing something that they are not suppose to do and or the do something that someone else was not ok with and or they didnt ask to do it.

Explanation:

Which of the following uses the proper syntax for creating an HTML comment?
a.
b. Home page for my personal website
c. // Home page for my personal website
d.

Answers

Answer:

c

Explanation:

Other Questions
To know what youre buying is a consumer? Right or responsibility?! Jen has a home she plans to rent out. She hires a management company that charges10.8% of the rental price for their fee. If the home rents for $1700/month, how muchwill Jen earn each month from the rent?State your answer in terms of dollars rounded to the nearest cent (hundredth). when the motion of the object dose not change, then the forces are______ PLEASE HELP 50 POINTS NO LINKSI NEED BOTH OF THEM i dont understand this at all someone help me what is the difference? complete the equation -30 - (-10) = Which of the following characterizes signs of depression If 4 gallons of milk cost $16.24, how much would 7 gallon of milk cost Scientists unearth one of the oldest known dinosaurs. Millions of years ago, a bloodthirsty dinosaur roamed Earth. The rough reptile terrorized its prey, viciously ripping apart animals with its sharp claws and knife-like teeth. Who was this fierce hunter? No, not Tyrannosaurus rex. It was Eodromaeus-a dinosaur the size of a dog! Scientists recently introduced the teeny meanie, whichthey discovered in Argentina. That is a country in South America. Experts say Eodromaeus (ee-oh- DROH-mee-uhss) is one of the oldest dinosaurs ever discovered. It lived during the Triassic Period about 230 million years ago. The dinosaur's name means "dawn runner." The pint-sized predator was four feet long from nose to tail and weighed less than fifteen pounds. Though Eodromaeus was small, it may hold big clues about the world's first dinosaurs."We're looking at a snapshot of early dinosaur life," says Paul Sereno. He is a paleontologist who helped find the reptile.A Meaty History Eodromaeus has a history that scientists can really sink their teeth into. The dinosaur was one of the very first theropods. A theropod was a meat-eating dino that walked on two legs. The great-granddaddy of T. rex shared some key features with later carnivores, or meat eaters. The reptile had sharp, narrow teeth. "They have small, steak knife-like [edges] so that when they are jabbed into flesh, they open a wound," Sereno explained to WR News. Eodromaeusmost likely chowed down on small dinosaurs and the young of other reptiles. Also, like later meat eaters, the dinosaur had hands that were perfect for grabbing its dinner. "The bones behind the claws are very long, so it can get the claw around something," Sereno explains.In addition, the end of the dino's tail was stiff to let Eodromaeus keep its balance while running.The Big Reveal Eodromaeus is helping scientists learn about other early dinosaurs. The reptile shared its turf with a similar-looking dinosaur called Eoraptor (ee-oh-RAP-tor). For years, experts suspected, or thought, that Eoraptor ate meat. But after comparing Eoraptor's and Eodromaeus's features, they determined that Eoraptor was an herbivore, or plant eater. Despite the dinos' different diets, they had a lot in common, including their size, experts say. "I think if they [ran] by, you might not even know the difference except that one might want to rip your arm off and the other one might ... hide in a bush," Sereno says. The fact that the dinosaurs shared so many features could mean that they are also very similar to the world's first dinosaur, Sereno says. Experts believe that dino roamed Earth ten million years earlier than Eoraptor and Eodromaeus did. That may seem like a long time, experts say, but it is relatively short compared with the 183 million years that dinosaurs existed.Digging Deeper Sereno and his team found both Eodromaeus and Eoraptor in northern Argentina. They believe the country may hold even more fossils-including the remains of the very first dinosaur. "We're going to go back," Sereno says. He's pretty sure some fossils will turn up. "They always come out to say hi when we come!"Profile of a Predator Small animals, beware! Eodromaeus's skeleton shows certain features that are common in all meat-eating dinosaurs, including T. rex. WHAT IS THIS ABOUT I need help with this Spanish 1 questions Write a question that has the quotient of -3/8 Is 666 = 37 positive or negative? 7.0g divided by 5.6g/cm cubed :O who watches disney intertwined?? IM CRYING IM SO HAPPPY OMG MARCO IS BACk AHHHHHHH What is (- 2g-6)-(g-10) Snog plz help me or anyone plz lend an hand to a failing grade plz be so kin as to help start by reading this The American colonies had accomplished an amazing success. Angry about their treatment by the British government, the colonists had protested and then revolted. After winning the Revolutionary War against England, they had formed a new country: the United States of America.During the war, the Continental Congress had formed a government under the Articles of Confederation. This document served as the first constitution of the United States. Because of their experiences with the British government, the colonists had limited the power of the United States central government under the Articles. After the war, however, many people realized that the government had too little power. It could not collect taxes or regulate trade. There was no executive to enforce laws and no court system to make sure laws were fair. The countrys leaders realized the United States needed a new plan of government.Respected people, or delegates, from all the colonies except for Rhode Island met in Philadelphia in 1787 to create a new constitution. For four months the delegates discussed problems and solutionsin secret so that no one would influence the decisions. Finally, in September 1787, they completed the writing of the United States Constitution. The next step was to get the document ratified, or approved, by nine of the thirteen states. That task was not easy.When Americans learned the specifics of the Constitution, two groups formed. People who supported the strong government created by the Constitution were called Federalists. People who worried that the government would be too powerful were called Anti-Federalists. As the states prepared to ratify the Constitution, these two groups worked hard to get people to join their side. Leaders of the Federalists wrote a series of essays published throughout the country. They urged the states to ratify the Constitution without any amendments. Meanwhile, the Anti-Federalists wanted to make sure that peoples rights were protected against the government. It soon became clear that some statesespecially big states such as Massachusetts, New York, and Virginiawere not ready to adopt the Constitution.What were the rights that the Anti-Federalists wanted to protect? The list included the right to speak freely, to worship freely, to have fair searches, and to have a trial by jury. These were all rights that the British government had ignored before the Revolution. Federalists claimed that those rights were protected even though they were not specifically listed. After more than two years of discussions, James Madison proposed amendments, or additions, to the Constitution that would protect a citizens rights.The House of Representatives passed seventeen amendments on August 24, and the Senate consolidated them into twelve amendments. The Senate passed them on September 9. In order for the amendments to become law, however, the states also had to approve them. Congress sent the amendments to the states on September 25. The states approved ten of the twelve amendmentsknown as the Bill of Rightson December 15, 1791. The United States had a new government plan that allowed it to become not only the most powerful nation in the world but also the greatest protector of human rights. What are two central ideas of the passage? Federalists didn't want a Bill of Rights.The creation of the Constitution was complicated.Many people worked together to create the Constitution.Personal rights were unimportant to Americans.James Madison proposed seventeen amendments. find the solution of the equation 4x-3/6x+1 =2-1/3+1 ayer / felipe y lola / enviar / mensajes por correo electrnico The big worry at the chapter's end isQuestion 5 options:dividing the treasureSmaug's locationreplacing the ponies Jumbled Words: Arrange the following words. (KITCHEN WEARS/TOOLS/EQUIPMENT)1. IBCENTAN - 2. WDRRAE - 3. OTLEW - 4. ISETUS - 5. NIKS - 6. BLETA KPANNI - 7. LEPAT - 8. SAGLS - 9. RFKO - 10. NOSOP -This is URGENT! 5 MIN. LEFTY'all i need this to be doneee!! Don't answer this quest if you don't know what's the answer.. Thanks!! Helpful answer/w explanation = Brainliest Answer Unhelpful answer/ Nonsense = Report (Delete)