1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya692 [45]
2 years ago
9

A file has TWo parts name them

Computers and Technology
1 answer:
lisov135 [29]2 years ago
4 0

Answer:

File name and file extension

Explanation:

You might be interested in
Which securities protect data through processes, procedures,decisions,and user pernissions. Determines where and how data can be
vovangra [49]

Answer:

Data can be stored on storage devices.

Explanation:

Network security, Application security and information security are the securities that protect data. Data can be stored on storage devices such as hard disk drives, solid state drives, external hard drives, USB flash drives and SD cards etc. Hard disk drives, floppy disks and tapes store data magnetically. The data can be stored with a device that spins the disk with magnetic coatings and heads has the ability to read and write information in the form of magnetic patterns.

5 0
3 years ago
Which option correctly identifies the expense that will cost you the most when you are living on your own?
larisa86 [58]
Cccccccccccccccccccccc
5 0
3 years ago
WHO IS EXCITED FOR COLD WAR SEASON 1????
xxMikexx [17]

Answer:

me  iggggggg

Explanation:

7 0
3 years ago
Read 2 more answers
________ states that the value of a network is equal to the square of the number of users connected to it.
Juliette [100K]

Answer:

This is known as the Metcalfe's Law

Explanation:

In 1980, Metcalfe's law was first presented, not considering users but the communication among compatible devices (e.g. telephone, fax machines and so on). It was after the globalization of the internet that the law got introduced to users and networks.

A demonstration of the law can be seen in fax machines, one fax machine is purposeless, however, the interconnection of multiple fax machines on the network increases the value of every fax machine because the number of the users of the fax machines increases. Similarly, the more the users of a particular service, the more relevant the service becomes.

8 0
3 years ago
Read 2 more answers
Which of these are branches of anthropology?
Lesechka [4]

The answer to "Which of these are branches of anthropology" is C... All of the above.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following statements is NOT true about a mainframe computer?
    14·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • 40 points to answer ALL
    9·2 answers
  • Which of the following is considered a modern method of communication?
    7·2 answers
  • (9.10 Code Practice: Question 1)
    12·1 answer
  • Betty set up an account on a popular social networking website. She wants to know whether the privacy policy is effective for he
    14·1 answer
  • In this exercise, you are asking the user to set a alpha numeric password for any website. Put some conditions.
    8·1 answer
  • Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
    10·1 answer
  • Which of the following is used to store the memory address for variable a into pointer
    9·1 answer
  • How can structure of a table change in sql. What general types of changes are possible
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!