1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bearhunter [10]
4 years ago
5

What type of file can most software applications read?

Computers and Technology
2 answers:
nikitadnepr [17]4 years ago
8 0

Answer:

text files

Explanation:

Text files are the files with .txt extension. They are the files that are basically not executable and contain just characters (letters, numbers and punctuations) without any special formatting. They are also called ASCII files.

Text files can be defined in different formats such as the ASCII for cross-platform use and can be read by most software applications and as a matter of fact source codes of programming languages (such as JavaScript, PHP) are written in text files but later changed to their corresponding extensions (.js and .php).

const2013 [10]4 years ago
6 0
I'm quite sure this will be a .txt file. =)
You might be interested in
Now, my Laptop has been working since I bought it yesterday it won’t start up and it when it does it overheats and shuts off, th
tekilochka [14]

I would bring it back since it’s not working. No way would I spend hard earned money on something that doesn’t work.

Hope this helps.

7 0
3 years ago
Read 2 more answers
You have taken a new job as a network administrator. Although you have been an IT professional within your organization for a nu
sdas [7]

Answer:

Except more than one token can exist on a token ring network

Explanation:

The token ring is the LAN(Local Area Network) in which the computer systems are connected with each other computers in the form of topologies. In the token ring networks more than one logic tokens from one host to another host.

The token ring has entirely taken over by the Ethernet because it is cheaper and better in price and performance.

3 0
4 years ago
10. Calculate the checksum for blocks of data with the following byte sum. (a) 1220 (b) 950​
OLga [1]

Answer:kalo gk salah yang

a

Explanation:

5 0
3 years ago
What is spam? electronic junk mail e-mail abuse e-mail subscriptions the e-mail server the opt out feature unethical use of e-ma
expeople1 [14]

Answer:

electronic junk mail.

Explanation:

7 0
3 years ago
Write an If...Then statement that assigns 0 to intX when intY is equal to 20
BigorU [14]

Answer:

wh,,what?

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Jesse is writing a physics quiz about the motion of a roller coaster cart. He has a clip art illustration of a cart rolling hori
    9·2 answers
  • Which is the term for a computer typically located in an area with limited security and loaded with software and data files that
    9·1 answer
  • What happened to Henry at the end of Chapter 4 in Bendy and the ink machine?
    9·2 answers
  • Ted is asked to create a page of family photos for his family reunion Web site. He will have about 20 pictures to post, with a c
    5·1 answer
  • What can Strings store
    15·2 answers
  • The variable most_recent_novel is associated with a dictionary that maps the names of novelists to their most recently published
    12·1 answer
  • Hoda wants to create a new presentation in PowerPoint with existing graphics and designs. What is the easiest and fastest way fo
    14·1 answer
  • C++ Language Use functions to solve all problems in the mentioned assignment
    12·1 answer
  • When an instruction is sent to the CPU in a binary pattern, how does the CPU know what instruction the pattern means
    7·1 answer
  • Place the steps in order for manually creating a New Contact Group
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!