1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenaWriter [7]
4 years ago
12

Four common types of files are document files, worksheet files, database files, and presentation files. true or false

Computers and Technology
1 answer:
scoray [572]4 years ago
7 0
<span>Four common types of files are document files, worksheet files, database files, and presentation files. true or false

Documents *.docx
Worksheets *. xlsx
Database  *.db
Presentation *.pptx

Note all extension ending with x are for current versions of Word, Excel, and Powerpoint, older versions have the same extension less the x on the end.
</span><span>
</span>
You might be interested in
Suppose that we are developing a new version of the AMD Barcelona processor with a 4 GHz clock rate. We have added some addition
bixtya [17]

Question:

Barcelona has an instruction count of 2.389E12, an execution time of 750 s, and a  reference time of 9650 s.

Answer:

New CPI is 1.379

Explanation:

Given:

Clock Rate=4 GHz

Reduction in number of instructions=15%

Execution time=700 sec

Instruction Count=2.389*10^{12}

Find:

New CPI=?

Solution:

Cycle Time=1/Clock Rate

Cycle\ Time= 0.25*10^{-9} sec

Execution Time= Clock cycles * Cycle Time

Clock Cycles=Execution Time/Cycle Time

Clock Cycles=\frac{700}{0.25*10^{-9}}

Clock\ Cycles= 2.8*10^{12}

New Instruction Count=2.389*10^{12}*0.85

New Instruction Count=2.03*10^{12}

CPI=\frac{Clock\ Cycles}{New\ Instructions} \\CPI=\frac{2.8*10^{12}}{2.03*10^{12}} \\CPI= 1.379

New CPI is 1.379

6 0
3 years ago
Which section in a slide is not visible to the viewers of a presentation, but is visible to the presenter in the normal Slide vi
lyudmila [28]

Answer:

the speakers note

Explanation:

when putting it in presenter view it'll have a separate window so you'll have access and see speaker notes etc

3 0
3 years ago
Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?
Nat2105 [25]

Answer:

The certification developed by the SANS is GIAC certification .In this there are 3 certification GSEC,GISF and GCED .The description of these certification is given below .

Explanation:

The GIAC certification course is providing the knowledge of the security like cryptography ,networkig knowledge etc .

GSEC:The GSEC Certification is the certification of the security.It simply means this certification certified about the security risk in the computer system .

GISF: This certification gives the knowledge of the networking as well as the security in the computer system also it gives the knowledge of the cryptography.

GCED :This certification is also providing the knowledge of security as well as networking.

Difference between GIAC and  InfoSec certifications is given below

  • The SANS certification is giving the knowledge about the security risk as well as cryptography by the professional where as the InfoSec certifications providing the knowledge of the hacking by the professional .
  • The SANS is including the certification of  GIAC certification where as the InfoSec certifications is including the  CISSP and SSCP certification .
4 0
3 years ago
What is a brute force attack? What are the ways you can make it harder for someone to use crack your credentials using a brute f
cricket20 [7]

Explanation:

A brute attack is a method of cracking someone's password/credentials using a predefined set or list of commonly used passwords or from a database leak.

We can prevent our passwords from being brute forced by using a combination of password with no dictionary words and using many symbols and numbers with both upper and lower case characters.

5 0
1 year ago
In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two syst
irga5000 [103]

Answer:

Proxy Server                        

Explanation:

  • Proxy server is a server that acts as a mediator between two systems.
  • One system can be your computer and the other can be the server to which you are asking a service, such as requesting a web page.
  • Lets suppose you request a web page from a server and you type a URL of a website to access a web page.
  • This request goes to proxy server which sends this request on your behalf to the target server in order to retrieve that web page.
  • Proxy server makes this request to the target server on the internet by using one of its IP addresses.
  • When the proxy server gets that web page, it will forward that web page to your requesting computer.
  • If you request a specific service such as a website frequently the proxy server saves that website on its cache.
  • So if you request that website again, proxy server will forward it to you from its cache rather than requesting it again from the target server on your behalf resulting in quick response to the user's request.
  • Proxy servers provide users with privacy to access the websites, and they can surf the internet anonymously .
8 0
3 years ago
Other questions:
  • The wireless spectrum, as defined by the fcc, spans between which two frequencies?​
    7·1 answer
  • In 2–3 sentences, describe how you would find a certain record.
    11·2 answers
  • For a wire with a circular cross section and a diameter = 3.00mm calculate the following: (m means meter. mm means millimeter. c
    5·1 answer
  • In a certain computation, 90% of the work is vectorizable. Of the remaining 10%, half is parallelizable for an MIMD machine. Wha
    9·1 answer
  • 4. Write an interface ObjectWithTwoParameters which has a method specification: double area (double d1, double d2) which returns
    9·1 answer
  • Consider the following concurrent tasks, in which each assignment statement executes atomically. Within a task, the statements o
    9·1 answer
  • What will happen if you reverse the connection of IDE?<br>​
    9·1 answer
  • Point out the wrong statement:
    7·1 answer
  • Very few games have any sort of narrative, not even a simple one that involves setting the mood through color, sound, environmen
    12·1 answer
  • Private notes about individual slides that you leave for yourself or for others who might use the presentation file is called __
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!