1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Musya8 [376]
4 years ago
13

.Exe, .msi, .msp, .inf - together, what do these filetypes indicate

Computers and Technology
1 answer:
Marianna [84]4 years ago
4 0
.exe is a file extension for files that contains a program you can execute on a computer. You can run an executable file in Microsoft DOS or Windows using a command or double-clicking the file. 
.msi Files are database files that have pre packed dependencies, code, etc that is used by the Windows Installer to install a program package onto the host PC. MSI files install computer code, whereas EXE files can be any file that runs on a Windows computer.  
.msp Indicates a Microsoft Patch file that may be used for patching or changing a program/firmware that pre-exists on the host PC. This extension is also used for Microsoft Paint bitmap files. 
.inf is a file extension for a plain text file used by Microsoft Windows for the installation of software and drivers. It is also referred as a Setup Information file. The INF<span> file contains various sections that specify the files to be copied, changes to the registry, etc.</span>
You might be interested in
NEED HELP RIGHT NOW!!! Which of the following is the definition of a privacy policy? * 5 points - A legal document that an app o
Marina86 [1]

Answer:

A legal document that an app or a website must provide to describe the rules the company and users must obey when they use the app.

6 0
3 years ago
from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
Brums [2.3K]
From January 2005 through July 2017, approximately 853 million electronic data records in the US were breached.
This allowed the attackers to take control over people's personal data, such as their various credit card numbers, and other important data, as well as their addresses, etc. The cyber police, as well as the regular police have been working hard to stop this from happening, but the hackers are very strong and smart.
4 0
3 years ago
Write a program that creates a two-dimensional array named height and stores the following data:
antiseptic1488 [7]

Answer:

Explanation:

The following code is written in Java and it simply creates the 2-Dimensional int array with the data provided and then uses the Arrays class to easily print the entire array's data in each layer.

import java.util.Arrays;

class Brainly {

   public static void main(String[] args) {

       int[][] arr = {{16, 17, 14}, {17, 18, 17}, {15, 17, 14}};

   

     

      System.out.print(Arrays./*Remove this because brainly detects as swearword*/deepToString(arr));

   }

}

4 0
3 years ago
Read 2 more answers
Technical colleges offer certification in audio engineering through programs that are normally from 2 to 6 months long.
Murrr4er [49]

Answer:

False

Explanation:

i said so

8 0
3 years ago
____ convert a program design developed by a systems analyst or software developer using one of many computer languages.
erica [24]

Answer:

"Programmer " is the correct answer for the following question.

Explanation:

A programmer is a person who created the software They are basically a coder who develop a code for the program or the software. They are specialists in some in the programming code area. The programmer are writing the program for a different kind of software.

The main objective programmer they convert the program design which is developed  by a systems analyst or system designer using a different kind of computer language  

4 0
3 years ago
Other questions:
  • If you wanted to only view the sales of $200,000+ in the table above, which number filter would you select?
    7·1 answer
  • What is the central unit of the computer that contains the logic circuitry and carries out the instructions of the computer's pr
    13·1 answer
  • Which of the following correctly describes the function of an IP address?
    7·1 answer
  • When using vlookup, the _____argument is optional?
    8·1 answer
  • A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
    7·1 answer
  • Find the inverse function of f(x)= 1+squareroot of 1+2x
    6·1 answer
  • Which questions should you ask yourself when performing research online?
    9·1 answer
  • Which attribute defines the file name for the specific image in an image tag??
    13·1 answer
  • 100 tickets are sold in a raffle with one prize. John has 8 tickets, Jamie has 10 tickets, find the probability that John wins
    11·2 answers
  • View One | View All
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!