1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
boyakko [2]
3 years ago
12

Judy has saved photographs on her computer. Which file extension will the saved photographs have? She has also created and saved

word documents. Which file extensions will the documents have?Judy has saved photographs on her computer. Which file extension will the saved photographs have? She has also created and saved word documents. Which file extensions will the documents have?
The saved photographs on Judy’s computer will have a _____(.exe,htm,bpm)file extension. The word documents will have a______(.mpeg,.doc,.zit) file extension.
Computers and Technology
2 answers:
liberstina [14]3 years ago
5 0
The saved photographs on Judy’s computer will have a bpm file extension. The word documents will have a doc file extension
valentina_108 [34]3 years ago
4 0

Answer:

The saved photographs on Judy’s computer will have a .bmp file extension. The word documents will have a .doc file extension.

Explanation:

You might be interested in
Description
meriva
33.33 minutes of video

3 GB already used which means you have 5 GB left, 5GB is the same as 5000 MB

So 5000 MB divided by 150 MB is 33.33 minutes of video that can be stored on the iPhone
8 0
3 years ago
What level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized
Oduvanchick [21]

The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.

<h3>What is a Subapplicant?</h3>

Subapplicant is known to be a term that connote a State agency, or a community, that is said to be submitting a subapplication to the applicant and this is one that is often used as a source of aid under the FMA program.

Note that Upon grant award, the subapplicant is seen as the subrecipient and thus, The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.

Learn more about subapplication from

brainly.com/question/14400492

#SPJ1

8 0
2 years ago
Which of the following is not a barrier to corporate control?​ a. ​antitakeover amendments b. ​proxy contests c. ​poison pills d
Elan Coil [88]

Answer: Proxy contest.

Explanation:

In corporate control it is the authority of the corporate organisation to take all the major decision. It takes decisions on matters related to marketing, investment, new project sanctioning, new fund raising, policy of the corporate and etc.

Among all the options we have proxy contest enable to secure enough votes in the corporate to win over the governance in the corporate. It is more over like an unfriendly war between the corporate allies. It garners support from stakeholders to gain corporate vote.

However, all the other options such as golden parachutes whereby an employee can get certain benefits if its employments is terminated and antitakeover amendments or poison pills serve as barrier to corporate control as these benefits and amendments causes barriers to making laws and governing them in a corporate. So proxy contest itself being a support mechanism to garner votes in the corporate mechanism do not form a barrier in corporate control.

5 0
4 years ago
Write a method called findNames that meets the following specs: It takes two arguments: a list of strings, allNames, and a strin
Anna11 [10]

Answer:

public class Solution {

   public static void main(String args[]) {

       String[] allNames = new String[]{"Bob Smith", "Elroy Jetson", "Christina Johnson", "Rachael Baker", "cHRis", "Chris Conly"};

       String searchString = "cHRis";

       

       findNames(allNames, searchString);

   }

   

   public static void findNames(String[] listOfName, String nameToFind){

       ArrayList<String> resultName = new ArrayList<String>();

       

       for(String name : listOfName){

           if (name.toLowerCase().contains(nameToFind.toLowerCase())){

               resultName.add(name);

           }

       }

       

       for(String result : resultName){

           System.out.println(result);

       }

   }

}

Explanation:

The class was created called Solution. The second line define the main function. Inside the main function; we initialized and assign an array called allNames to hold the list of all name. Then a String called searchString was also defined. The searchString is the string to search for in each element of allNames array. The two variables (allNames and searchString) are passed as argument to the findNames method when it is called.

The method findNames is defined and it accept two parameters, an array containing list of names and the name to search for.

Inside the findNames method, we initialized and assigned an ArrayList called resultName. The resultName variable is to hold list of element found that contain the searchString.

The first for-loop goes through the elements in the allNames array and compare it with the searchString. If any element is found containing the searchString; it is added to the resultName variable.

The second for-loop goes through the elements of the resultName array and output it. The output is empty if no element was found added to the resultName variable.

During comparison, the both string were converted to lower case before the comparison because same lowercase character does not equal same uppercase character. For instance 'A' is not same as 'a'.

8 0
3 years ago
The set of three integer values for the lengths of the sides of a right triangle is called a Pythagorean triple. These three sid
Sloan [31]

Answer:

In Python:

def  Pythagorean_triple(hyp,side1,side2):

   if hyp**2 == side1**2 + side2*2:

       return True

   else:

       return False

               

print("Hypotenuse\tSide 1\t Side 2\t Return Value")

for i in range(1,501):

   for j in range(1,501):

       for k in range(1,501):

           print(str(i)+"\t"+str(j)+"\t"+str(k)+"\t"+str(Pythagorean_triple(i,j,k)))

Explanation:

This defines the function

def  Pythagorean_triple(hyp,side1,side2):

This checks for pythagorean triple

   if hyp**2 == side1**2 + side2*2:

Returns True, if true

       return True

   else:

Returns False, if otherwise

       return False

               

The main method begins

This prints the header

print("Hypotenuse\tSide 1\t Side 2\t Return Value")

The following is a triple-nested loop [Each of the loop is from 1 to 500]

for i in range(1,501): -->The hypotenuse

   for j in range(1,501): -->Side 1

       for k in range(1,501):-->Side 2

This calls the function and prints the required output i.e. the sides of the triangle and True or False

           print(str(i)+"\t"+str(j)+"\t"+str(k)+"\t"+str(Pythagorean_triple(i,j,k)))

8 0
3 years ago
Other questions:
  • Which method of deleting files can be used in windows xp and vista?
    12·1 answer
  • 14.18 Lab 5d - Nested Looping Write a program that:
    10·1 answer
  • How to jailbreak ios 9.2 ? Is there anyway???!!!!
    12·1 answer
  • Suppose within your Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in
    10·1 answer
  • You need to implement a web application that is split in three parts, namely, Webpage, PHP and MySQL. Each of them will be used
    13·1 answer
  • If you insert a single row by using the Insert command on the shortcut menu, you can continue inserting rows by repeatedly press
    7·2 answers
  • Flash drives plug into a(n) _
    7·2 answers
  • If there is a combination of two or more attributes which is being used as the primary key then we call it as
    12·1 answer
  • Pls help I will give points
    11·1 answer
  • What type of os must be installed on your machine to allow this type of action by another person?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!