1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler79 [48]
2 years ago
15

1. The letters that appear after the dot after a file name are called the:

Computers and Technology
1 answer:
Murrr4er [49]2 years ago
7 0

Answer:

Files Extension.

Explanation:

The letters that follow the period at the end of a file name are the file's extension. This enables the computer to know what application it should use to read the file.

You might be interested in
Your friend just gave you his old laptop. Whenever you turn on the laptop, though, a black screen appears and asks you to enter
Anastasy [175]

Answer:
C is the answer!

Explanation:

A hard drive contains your operating system which can include your settings and preferences that you included in your device. But it mostly is a storage device so we know it WOULD NOT BE (B.

WOULD NOT BE D beacause powering it back on wouldnt do anything but bring you back to the start.

WOULD NOT BE A beacuse when taking out the battery then putting it back in would just be like turning it off then back on beacuse that just hold the power to a device.

IT WOULD BE C, C IS THE ANSWER beacuse a CMOS batttery contains the main system settings and  also contains information so i think C would be the best answer for this choice.


Hope this helps!
xx <3

7 0
2 years ago
A spreadsheet has some values entered: Cell A1 contains 10, cell A2 contains 14, cell A3 contains 7. You enter in cell A4 the fo
lesya [120]
The value displayed in A4 is 24
5 0
3 years ago
_______ is a process that insures that operations meet data validity standards. For instance, information systems that process c
lutik1710 [3]

Answer:

The answer is consistency

Explanation:

Information systems deal with the retrieval, storage, manipulation and sharing of data for organisational needs. It is important that there are measures in place that corresponds to data validity standards. The process that ensures that operations meet these standards is known as consistency.

This is very necessary for information systems.

5 0
3 years ago
"when a dynamic web page is requested, the web server passes the request to"
nalin [4]
System operations of the website u are  asking to access
7 0
3 years ago
How can the connection to salesforce be restricted only to the employee portal server? Universal containers (UC) uses a legacy E
Ad libitum [116K]

Answer

To restrict the connection only to the employee portal server, the IP address of the application should be added into the list of Trusted IP's.

Explanation:

Trusted IP's are the IP's that are used to identify the users that can be verified easily. Those users whose IP's are not listed in the trusted IP list needs to verify their identity by sending them login code on each transaction.

<em>In above mentioned case, We need to enlist the IP address of employee portal list in trusted IP list to ensure the restriction of login to employee only.</em>

4 0
3 years ago
Other questions:
  • In this program, you will create an object and display it. Create a class nerf Gun that includes data members model (string), ra
    5·1 answer
  • Conceptual note-taking is the act of
    15·1 answer
  • Consider a computer system, where each processor can independently perform a separate task. given that the response time on a co
    10·1 answer
  • Fill in the blank with the letter HTML
    14·1 answer
  • How do you respond to an email?
    6·1 answer
  • The function below takes a single argument: data_list, a list containing a mix of strings and numbers. The function tries to use
    6·1 answer
  • Danica is creating a flyer for her cookies that she will sell during her school fair. She wants to add a registered
    7·1 answer
  • In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyon
    10·1 answer
  • How do I add a Child to my Brainly account
    6·1 answer
  • when inputting a formula into excel or other spreadsheet software, what components are required for the formula to function prop
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!