1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pani-rosa [81]
2 years ago
15

A cookie is stored on your device's memory or disk in what file format? 1.)video file

Computers and Technology
1 answer:
Natalka [10]2 years ago
4 0

Answer:

text file format

4 this is the answer

You might be interested in
Can you explain the difference between software and hardware? Tell me 3 examples of each one.
solniwko [45]

Answer:

Hardware like a CPU computes the things like a painting software but the painting software is just a platform to draw things as it doesn't have any purpose without the hardware as it can't be ran. A GPU is a gaming processing unit to process the 3D Environment or a 2D Game Or to render 3d objects.

Explanation:

5 0
3 years ago
Identify when programmers use an Else statement.
Gnesinka [82]

Answer:

to tell the program to take a different action when the If statement answer is false

Explanation:

if x = 0:

     print('x equals 0')

else:

      print('x equals something else that isnt 0')

4 0
3 years ago
Read 2 more answers
What arw two reasons for maintaning your privacy on the internet
Mekhanik [1.2K]

Answer:

so people can't get your information and use it to their advantage and because you never know what people could do with that information

Explanation:

8 0
3 years ago
Read 2 more answers
What are some of these new iPad extras? One is the iMarker. Crayola teamed up with another company to make it. It costs $29.99.
saul85 [17]
Another one is iMovie which allows you to edit and cut things.
5 0
3 years ago
What command is used to generate an RSA key pair?
Leokris [45]

Answer:

D) crypto key generate rsa

Explanation:

In cryptography, the RSA refers to Rivest–Shamir–Adleman. This is an algorithm used for encrypting and decrypting messages in computers thereby ensuring secured transmission of data. In order to generate an RSA key pair, you will use the command crypto key generate rsa while in the global configuration mode. This command has the following syntax:

crypto key generate rsa [general-keys| usage-keys| signature| encryption] [<em>labelkey-label</em>] [exportable] [modulus <em>modulus-size</em>] [storage <em>name of device</em>:][redundancy][on <em>name of device</em>:],

with each parameter having its description

5 0
3 years ago
Other questions:
  • While driving you encounter an emergency vehicle stopped ahead. Discuss how the move over law applies to this situation and your
    13·1 answer
  • 2. What is the purpose of an outline? (1 point)
    8·1 answer
  • The command button to protect a document is part of the​.
    10·1 answer
  • The __________ utility has the capability to manage users, create and administer user groups, and apply user rights to those use
    8·1 answer
  • "What technology will examine the current state of a network device before allowing it can to connect to the network and force a
    6·1 answer
  • If you have an equipment failure while driving on an expressway, you should
    8·1 answer
  • Write an algorithm that accepts two numbers,
    7·1 answer
  • If I got a monitor and kept my garbage laptop could I play games on max graphics?
    13·1 answer
  • (Print distinct numbers) Write a program that reads in integers separated by a space in one line and displays distinct numbers i
    8·1 answer
  • Below you will find the requirements to identify the Account Diversity Grade of a user. Read the requirements carefully and iden
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!