1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
malfutka [58]
4 years ago
9

Marie can now edit her photos, send them in emails, print them on a printer, and use them as wallpaper on her computer. This is

because Marie converted the photos to JPG files. TASS files. AI files. OCR files.
Computers and Technology
2 answers:
seropon [69]4 years ago
8 0

Answer:

This is because Marie converted the photos to JPG files

Explanation:

If you want to place any of the photos as a wall paper, then it allows only “GIF, JPEG, JPG” only. In order to take a print of the photo, even the printer software should recognize the type of file to get an hard copy out of it. You can edit photo of JPG with the help of so many image editing software that is available in the market. Certain software are free of cost and few are paid one where they have easy tools to edit the image, add lots of graphics to enrich the photo or image.  

OCR will convert the word file to an image file.

AI files are the files created by Adobe illustrator. It creates image based on vector.

AVprozaik [17]4 years ago
4 0

I could be wrong, but I believe this one would be JPG files.

You might be interested in
How many keys are utilized in symmetric cryptography?A. OneB. TwoC. ThreeD. Four
eimsori [14]

Answer:

A. One

Explanation:

Symmetric key cryptography makes use of one key. The same key is used for both encryption and decryption. This is different from asymmetric cryptography where separate keys are used for the two operations. Some examples of symmetric cryptography include:

  • Advanced Encryption Standard (AES)
  • Data Encryption Standard (DES)
  • Triple Data Encryption Standard (3DES)
  • Blowfish
7 0
3 years ago
Computers can think for themselves<br><br> True<br><br> False
gizmo_the_mogwai [7]

Answer:

false

Explanation:

4 0
3 years ago
Read 2 more answers
You are looking for a backup that copies only the files that have changes since the last full backup. Which of the following wil
adelina 88 [10]

Answer: d. incremental backup

Explanation:

In incremental backup it copies only the files that have changed since the last full backup. It does not backup all the files just like the full backup. it however backup those copies into the  system which has changed since the last backup.

In doing  so it just increases the efficiency and performance of the backup procedure. This process is basically preferred when the amount of file to be backup is huge and there is not enough time to do a full backup.

Increment backup also use less disk space.

Cloud backup uses most increment backup for its application.

6 0
3 years ago
Can development and conservation of environment go hand-in-hand? Explain your point of view
Wewaii [24]

No, development and conservation of environment cannot hand in hand.

Explanation:

Because during the developmental process the destruction of the environment is necessary.For example,if you want to construct a Road which is one of the developmental activity,so to construct road the clear of forest is must .

5 0
3 years ago
What can help you best learn about appearance, habitats and behaviors of birds in your area
Korvikt [17]

c microbiology textbook

8 0
3 years ago
Other questions:
  • A classmate is texting a false rumor around school that another student was arrested for shoplifting. This behavior can be descr
    9·2 answers
  • What does the metric column in a routing table do?
    8·1 answer
  • 1. Which mechanical part or feature listed in the section on Critical Vehicle Systems do you think is most important?
    8·2 answers
  • 58:30
    8·1 answer
  • In checking the digital signature, the verifier ____. a. decrypts the digital signature it received with the supplicant public k
    13·1 answer
  • Select the tips you should follow when writing a business report.
    12·1 answer
  • Write a for loop to populate array userGuesses with NUM_GUESSES integers. Read integers using cin. Ex: If NUM_GUESSES is 3 and u
    9·1 answer
  • What is the use of folders in the computer system ?​
    14·1 answer
  • How tractors are controlled
    8·2 answers
  • Why computer is used in education sector<br>​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!