1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrac [35]
3 years ago
8

Type the correct answer in the box spell all words correctly

Computers and Technology
1 answer:
MrRissso [65]3 years ago
7 0
TIFF should be the correct answer.
You might be interested in
Unwanted or unneeded software included by manufacturers on new computers is called
Travka [436]
The answer is called bloatware. This is unneeded files that are actually on the computers which are already there even if it's new. It doesn't have any essential function and sometimes is a trial version. The application also adds up space which limits your free space storage. In other words, because it has no significant tasks to handle it is unnecessary, but it only serves as an additional profit to the company once it is purchased by the buyer.

Bloatware may also come especially in adware where a lot of extension applications are sometimes automatically installed after it is allowed to operate in just a click. The only solution for a bloatware is to uninstall it.  .
5 0
3 years ago
Explain your understanding of distributed object system.
Paraphin [41]

Answer:

In the distributing computing, distributed object system is the process in which the distributed object are get distributed in different address space. The distributed object system is the enhancement of the client server model.

Distributed object are basically refers to the software module which are designed in such a way, so that they work together in the network.

And it is distributed physically within the network area and the methods is executed on the basis of remote host in the distributed system.  

7 0
3 years ago
Which of the following is not true of hardware VPNs?A) should be the first choice for fast-growing networks.B) can handle more t
vfiekz [6]

Answer:

C) have more security vulnerabilities than software

Explanation:

Hardware VPN is a computer term that described a separate tool that serves the functions of a virtual private network. It has its own component and an internal processing unit.

However, some of the characteristics of Hardware VPN is the following:

1. It is expensive compared to software VPN

2. It is generally faster

3. It requires more than a beginner to handle

4. With an in-built firewall, it is generally more secure compared to a software VPN.

Hence, in this case, the correct answer is option C.

3 0
4 years ago
You live "out in the middle of nowhere" and feel there is no need to protect your internet connection because there is no one th
dlinn [17]
Yes, it put you at risk, and could have actually gotten you killed.
4 0
3 years ago
What is a graph,a chart then give similarities between graph and chart.​
Alik [6]

Answer:

A diagram showing the relation between variable quantities, typically of two variables, each measured along one of a pair of axes at right angles. A collection of points whose coordinates satisfy a given relation. A sheet of information in the form of a table, graph, or diagram. Normally graphs and charts in excel are very much similar to each other, but they are different, Graphs are mostly a numerical representation of data as it shows the relation of change in numbers that how one number is affecting or changing another, however, charts are the visual representation where categories may or may not be related to each other also how the information is displayed is different in both graphs and charts.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which activity cannot be done on a social networking site?
    12·1 answer
  • If we have a priority queue storing approximately million numbers, and the bottom level is "full", which of the following statem
    9·1 answer
  • To create a button that will allow a user to send the form data to the server you use a type of ____
    5·1 answer
  • Is a plotter input output or both
    10·1 answer
  • Anusha wants to use her computer,rather than handwriting the information on her notepad,to analyze her monthly expenses to make
    14·1 answer
  • A type of Knowledge Management System is called
    5·1 answer
  • Describe the 3 different types of authentication
    6·2 answers
  • The first step in the information processing cycle is _____, which involves entering data into the computer.
    8·1 answer
  • Select the correct answer
    5·2 answers
  • Misspelet errors are displays with a ...<br>.. below them<br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!