1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zysi [14]
3 years ago
6

"this type of file contains data that has not been converted to text"

Computers and Technology
1 answer:
umka2103 [35]3 years ago
7 0
A <span>Binary file has not been converted to text.</span>
You might be interested in
1. Write an expression whose value is the result of converting the str value associated with s to an int value. So if s were ass
maksim [4K]

Answer:

The solution or expression for each part is given below:

  1. int(s)
  2. s[len(s)-1]
  3. last.capitalize()+','+first.capitalize()
  4. str(x)
  5. s[5:]

Explanation:

Following are attached the images that show how these expressions will be used. I hope they will make the concept clear.

All the images below are respective to the questions given.

7 0
3 years ago
If a company's IS-related programs are not developed in-house, then the development group of the IS department will be staffed p
EastWind [94]

Answer:Systems analysts

Explanation: System analyst is referred as the person in an organization for resolving the issue related program and information technologies. The person basically design the solution by analyzing the problem accordingly.

Information system of company has any separate department for handling the problems related with the IS-related programs. These problem usually lies under the department of the system analyst. They work on the problem solving, improvement and improvisation, training etc.

3 0
3 years ago
How can you enter Task Manager in Windows? Select 3 options. press Ctrl + Shift + Tab press Ctrl+Alt+Delete and then click Task
Sophie [7]

Answer:

Please find the 3 options below.

Explanation:

To begin with, Task Manager in windows, is a monitor program that provides information or shows application and processes running on a computer. Task manager also provide insights about the general status of a computer. The three options for entering or accessing task manager in windows are:

1. Press Ctrl+Alt+Delete and then click Task Manager

2. Right-click the taskbar and choose Start Task Manager

3. Right-click the taskbar and choose Manage Tasks

5 0
4 years ago
You have to display or connect to network shares on remote computers. Which command-line utility will you use to accomplish the
Xelga [282]

Answer:

net use X: \\SERVER\Share

Explanation:

1. Connect securely to the remote computer or ensure you have access to it on the network

2. then follow the step below:

Where X: is the drive letter you wish to map the share to, and \\SERVER\Share is the UNC path to the share. This should make the share visible in My Computer and the command line as well like all other shares mapped through the GUI.

In order to later disconnect the share, you would use

net use X: /delete

8 0
4 years ago
What do you setup when you want to filter traffic from getting through a firewall?
Andreyy89

Explanation:

Windows Firewall

Windows Firewall is a packet filter and stateful host-based firewall that allows or blocks network traffic according to the configuration. A packet filter protects the computer by using an access control list (ACL), which specifies which packets are allowed through the firewall based on IP address and protocol (specifically the port number). A stateful firewall monitors the state of active connections and uses the information gained to determine which network packets are allowed through the firewall. Typically, if the user starts communicating with an outside computer, it remembers the conversation and allows the appropriate packets back in. If an outside computer tries to start communicating with a computer protected by a stateful firewall, those packets are dropped automatically unless access was granted by the ACL.

6 0
3 years ago
Other questions:
  • Match the following.
    8·2 answers
  • A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory addressing if the smallest ad
    10·1 answer
  • PLEASE HELP!!!!! MUCH OBLIGED!!!!
    15·1 answer
  • Who is the last person appointed to the u.s supreme court
    11·1 answer
  • A simulation model includes: a. a description of the components of the system. b. a simulation clock. c. a definition of the sta
    8·1 answer
  • . How is using 0 / 1 or true / false in specifying digital an abstraction?
    11·1 answer
  • What is the first priority when building or using vex robots
    10·2 answers
  • What ribbon command on the home tab can you use to change a cell fill color
    5·2 answers
  • 23. Convert the following to Megabytes<br> a) 2GB<br> b) 2056 Bytes-
    8·2 answers
  • You’re investigating an internal policy violation when you find an e-mail about a serious assault for which a police report need
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!