1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firlakuza [10]
4 years ago
8

Which file types have .exe and .png as their extensions?

Computers and Technology
1 answer:
cricket20 [7]4 years ago
7 0
EXE files are executable files.
PNG files are picture files like JPEG etc.
You might be interested in
Universal Containers (UC) uses a custom object called Vendor. The Vendor custom object has a Master-Detail relationship with the
Rudik [331]

Answer:

The account record comprises of Invoice roll up summary fields.

Explanation:

The possible reason that this change was not permitted was that the account record comprises of Invoice roll up summary fields.

Invoice roll up summary fields: A roll-up summary field computes values from associated records, for example those in a linked list. a person or someone ca design a roll-up summary field to show a value in a master record by building  the values of fields in a particular record.

The detail record must be associated to the master through a master-detail relationship. for instance, you want to show the sum of invoice amounts for all linked custom object records in an account’s Invoices related list. you can show the whole or sum in a custom account field refereed to as Total Invoice Amount.

4 0
3 years ago
Free 35 points!!!
Black_prince [1.1K]

Answer:

free points?? why does it have question then

Explanation:

5 0
3 years ago
Read 2 more answers
Adjectives to describe programming skills
Ronch [10]

Answer:

Here are some adjectives for programmer: archetypal `real, ultimate navigational, former lucid, one-year-old professional, year-old professional, media-friendly genetic, inevitable seven-year, >gical, adgical, ever silent and phlegmatical, silent and phlegmatical, ]real, extremely defensive, and brilliant cryptographic.

8 0
3 years ago
Java uses ____ to implement method lookup.A) a jump tableB) an inheritance treeC) restricted accessD) polymorphism
sashaice [31]

Answer:

D) polymorphism

7 0
4 years ago
What are some of the strategies that you use for confronting a complex problem and breaking it down into smaller pieces? How mig
bazaltina [42]

Answer:

Breaking it down I guess for me, you could take down all the possible things that you could do. Eliminating things, one by one. It could help working on a computer by not letting yourself get over-whelmed by all your programming and thinking "alright, this THEN this."

Explanation:

8 0
3 years ago
Other questions:
  • As of 2012, Twitter has approximately how many members?
    10·1 answer
  • Ten 9600-bps lines are to be multiplexed using TDM. a. Ignoring overhead bits in the TDM frame, what is the total capacity requi
    6·1 answer
  • 14. Emelia is very concerned about safety and has conducted a study to determine how many bike helmets were replaced at each loc
    13·2 answers
  • According to the video, who is the most common employer for Foresters?
    14·2 answers
  • A company that wants to send data over the Internet has asked you to write a program that will encrypt it so that it may be tran
    6·1 answer
  • When is a wrecker considered to be an emergency vehicle?
    12·1 answer
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • In which scenario would someone want to use the Paste Link option?
    7·1 answer
  • Step 1: Configure the initial settings on R1. Note: If you have difficulty remembering the commands, refer to the content for th
    10·1 answer
  • Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not acces
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!