1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
3 years ago
15

In which situation will file compression be required to complete the task

Computers and Technology
1 answer:
Kryger [21]3 years ago
4 0
To make easy transfers and to limit the amount of files being moved at a time
You might be interested in
Which is considered to be the oldest form of social media? A. media-sharing sites B. location-based services C. social networkin
neonofarm [45]

Answer:

b location based services

Explanation:

:)

4 0
3 years ago
Which statement best describes network security
Andreyy89
<span>B.network security means all personal information is kept safe the network is not compromised and only authorized users had access 

Im pretty sure they ment has instead of had</span><span />
3 0
3 years ago
Read 2 more answers
A customer in Lowe's needs help. Matt works in shipping and receiving. It isn't Matt job to work with the customer, but he knows
klio [65]

Answer:

40

Explanation:

hhhhhjjjj

5 0
3 years ago
Read 2 more answers
Which measure should you take for the periodic maintenance of your computer?
WITCHER [35]
I believe the answer is annual maintenance
Hope this helps :p
6 0
3 years ago
Read 2 more answers
I have a message for anyone reading this
uysha [10]

Answer:zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz

Explanation:

4 0
3 years ago
Other questions:
  • Carmina wants to move a paragraph to the right margin of the document she is working in. She moves her cursor to
    8·2 answers
  • True are fulse A piece of information that is considered common knowledge does not need a citation
    5·2 answers
  • Who is typically considered to be the father of computing
    6·1 answer
  • Smart art and shapes are useful tools because they allow you to
    6·1 answer
  • 12. When trying to identify the sorted column in a table, you would look for the column where A. an arrow is displayed in the fi
    10·2 answers
  • The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer sy
    14·1 answer
  • Explain the importance of mobile computing in communication​
    7·2 answers
  • Write a java program to print the following series: <br>1 5 9 13 17...n terms​
    13·2 answers
  • Can somebody do an Algorithm 2 for more?<br> (Python)
    15·1 answer
  • In cryptocurrency, a block is only considered valid if it has a.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!