1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marizza181 [45]
3 years ago
7

Which image file format consumes the most file space? 0 GIF JPEG PNG

Computers and Technology
1 answer:
gogolik [260]3 years ago
5 0

Answer: jpeg becauuse itss correct

You might be interested in
Audrey would like to save her document. She should choose the Save command from the _____. folder menu window directory
Damm [24]

Answer:

File folder

Explanation:

6 0
3 years ago
Remember to check the on your vehicle first to see if a repair is covered by the manufacturer.
krok68 [10]

Answer:

insurance or warranty

Explanation:

It should be insurance because insurance can cover things like car repairs and other things that goes wrong. warranty could work too because it kind of means the same thing.

5 0
4 years ago
What is computer generation​
MA_775_DIABLO [31]

Answer:

Generation in computer terminology is a change in technology a computer is/was being used which includes hardware and software to make of an entire computer system .

8 0
2 years ago
How many survey monkey devices are you allowed to have for each user
svp [43]

Answer:

(Hope this helps can I pls have brainlist (crown) ☺️)

Explanation:

Per account, you can verify up to two devices at once. The removal of a recognized device and the addition of a new one counts against your removal limit. You can only log in from the two most recent confirmed devices if you hit the removal limit.

3 0
3 years ago
OSHA standards appear in the ___________ and are then broken down into ____________.
miskamm [114]
OSHA standards appear in the <span>Code of Federal Regulations (CFR) and are then broken down into Parts</span>
3 0
3 years ago
Other questions:
  • Write a program that uses a two dimensional array to store the highest and lowest temperatures for each month of the calendar ye
    10·1 answer
  • Codio Challenge Question (Python)
    6·1 answer
  • The main workplace of a Windows computer is called the
    14·1 answer
  • What is one of the most effective security tools available for protecting users from external threats?
    15·1 answer
  • The variable most_recent_novel is associated with a dictionary that maps the names of novelists to their most recently published
    12·1 answer
  • Jemima is reviewing her history report and notices that her headings are not formatted the same throughout the
    7·1 answer
  • You are an online training company and stream a lot of training videos from your
    12·1 answer
  • Given the 32-bit binary number:
    13·1 answer
  • All operations used to construct algorithms belong to one of three categories: sequential, conditional, or iterative. Below is a
    15·1 answer
  • 1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!