1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timurjin [86]
3 years ago
10

Judy forgot where she saved a certain file on her computer. Therefore, she searches for all files with a .jpg file extension. Wh

ich type of file is she searching? program files audio files graphic files document files video files NextReset
Computers and Technology
2 answers:
Orlov [11]3 years ago
5 0

the answer is C , GRAPHIC FILES hope this helps


Pani-rosa [81]3 years ago
4 0
She is searching for Graphic files
You might be interested in
Misspelet errors are displays with a ...<br>.. below them<br>​
kkurt [141]

Answer:

The are displayed with red lines below them

3 0
3 years ago
What are the main purposes of regulatory policies? Check all that apply.
zhenek [66]
Hey there,
<span>- To make business competitive
- To limit and prevent monopolies
- To place regulations on prices.

Hope this helps ;))

~Top
</span>
5 0
3 years ago
Read 2 more answers
Most file managers include a way to create a folder through the save dialog box. true or false?
Illusion [34]

Answer:

false because most of the file managers just keep Everything organized by dates, years, and everything like that

Explanation:

5 0
2 years ago
Problem 1 (Authentication): Consider the following authentication protocol, which uses a classical cryptosystem. Alice generates
Elis [28]

Answer:

Check the explanation

Explanation:

Yes, going by the question above, the protocol validates Bob to Alice for the reason that the key is only shared between Bob and Alice as well as the number which is being sent randomly. Therefore the invader won’t be able to predict and response to that number. Because of the authentication protocol, that makes use of a classical cryptosystem thereby resulting into the possibility of an argument such that key finding is attainable via invader.

5 0
3 years ago
How dependent are we on technology? ​
rusak2 [61]

very independent  : ) we use it for everything

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which type of drawer has three dispensing modes: single-dose, multi-dose, and matrix?
    13·1 answer
  • The type of database that uses fields, records, and measure as data attributes is
    7·1 answer
  • Using underlining and italics at the same time is which of these? A. allowed but might be overkill B. always a good idea C. not
    15·2 answers
  • Give the appropriate term for each of the following.1. An easy-to-remember address for calling a web page (like www.code.org). 2
    8·1 answer
  • What is the decrypted binary
    9·1 answer
  • What is a simulation?
    5·2 answers
  • If Anyone can help me out that'll be great
    11·1 answer
  • What statement describes the last step in evaluating<br> information?
    10·1 answer
  • How do people decide their ethical behavior
    13·2 answers
  • When Brittany practiced her presentation, she gave a trusted adult a presentation checklist to use to critique her each time she
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!