1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
4 years ago
6

Which choice lists two image formats that support transparency

Computers and Technology
2 answers:
hjlf4 years ago
7 0
One is a PNG (You can turn images into PNG by using Save As)
zloy xaker [14]4 years ago
6 0
The answer to this is <span>GIF 89a and PNG...i hope that this has helped u</span>
You might be interested in
what happens when you double-click on a file with an extension that represents an executable program?
Vlada [557]

Answer:

it will execute the file

Explanation:

3 0
3 years ago
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
How does a computer find a home group and join it
dezoksy [38]

Answer:

pen the Start menu, do a search for HomeGroup and press Enter.

Click the Join now button. ...

Click Next.

Select the content you want to share on the network by using the drop down menu for each folder and click Next.

Enter your HomeGroup password and click Next.

Explanation:

hope this helps if not ask me :);):):):)

6 0
3 years ago
A student is curious about how a Web site appears on his computer screen. On a piece of paper,
nata0808 [166]

A student is curious about how a Web site appears on his computer screen. There is a communication between the client and the server in the Application Layer.

Explanation:

  • When we choose to open a webpage (in any browser) the seventh layer of the OSI model - called Application layer will help to do that.
  • What happens after we write the webpage address in address bar is that the Application layer protocol (also called HTTP) formats and sends the request from the client's browser (Internet Explorer, Mozilla Firefox , Opera, Safari etc.) to the server.
  • It also formats and sends the server's respond back to client's browser. This process happens very fast and all the OSI model layers are processing in it (not only the Application layer).
  • All the layers are working together and each of them is responsible for some particular job, but all together they work as one. The layers communicate with each other and in case of error they will retry and fix the error or if they are unable to do it, the responsible layer will inform the user about the source of the problem.
  • What happens when page is requested and received? If we will remove the graphical and visual image and look at the process that computer does. We will see a set of commands, mathematical algorithms, symbols, letters and not understandable codes and processes.
  • When data is sent from "A" to "B", a transport layer is responsible to send and deliver it correctly and exactly the same, what was requested.
  • If the request, processed by "A" (sender) is too long, the transport layer will divide it in segments (called segmentation process) to understand well and not make a mistake while sending the data to "B" (recipient). After this process data is travelling through the network to the "B" (recipient), if the sent data is segmented or divided, the transport layer is responsible for reassemble it again and "B" (recipient) receives its requested data (It can be web page or other data).
  • If the transport layer will not do the segmentation process, then the next - network layer - will check the data and if the requested message is too long it will fragment it (called fragmentation process) and will provide the same as transport layer had to do.
  • All the layers processes are connected to each other and work cooperatively.
5 0
3 years ago
After turning on your computer ,it prompts you to type a password to continue the boot process. However ,you forgot the password
Vanyuwa [196]

Answer:

It depends if you are using a PC or laptop

Explanation:

PC:

Remove the BIOSjumper from the motherboard (look in your manual to find this). Turn on the PC without the jumper and let everything load up. Then turn off your PC again and turn it back on with the BIOSjumper back in.

Laptop:

Turn off the laptop (plugged out). Then remove the CMOS battery from the motherboard (again manual). Wait around 15 minutes then put it back in and boot up your laptop again.

8 0
3 years ago
Other questions:
  • A (n) _____ exposure is a short term or brief exposure that may create an immediate health hazard
    9·1 answer
  • Windows domain policy to disable windows 10 update
    7·1 answer
  • Please help me out with my essay
    15·1 answer
  • Briefly explain five measures you have undertaken to protect your confidential
    12·1 answer
  • The memory locations listed in a procedure header's parameterList have procedure scope and are removed from the computer's main
    9·1 answer
  • Antivirus software products require that you update _____ on a regular basis
    8·2 answers
  • Slide layouts can be changed by _________
    6·1 answer
  • What of the following is not a benefit of active listening
    8·2 answers
  • Of all excavation hazards, _______ poses the greatest risk
    8·1 answer
  • What are the academic benefits of practicing netiquette? Check all that apply.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!