1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
3 years ago
7

A file type is the standard used to and information in a computer. All file types have unique that determine which program to us

e to open a particular file and to access its data.
Computers and Technology
1 answer:
Oxana [17]3 years ago
4 0

The term record types portrays the assortment of relationship among archives and the applications that utilization them. The most clear utilization of this component is that, for instance, Windows knows to run Notepad when you double tap on a book report in Explorer (confirmation that Windows XP isn't genuinely question arranged).

Genuine object-situated configuration manages that articles (for this situation, records and envelopes) know about their very own attributes. This plan is just copied in Windows XP. Rather than each record knowing which application is utilized to alter it, Windows decides how to deal with a document dependent on the filename expansion. This structure has points of interest and weaknesses, however Microsoft's choice to shroud filename augmentations, the reason for record affiliations, just makes the entire framework increasingly hard to comprehend and ace.

Everything begins with document augmentations, the letters (normally three) that pursue the period in many filenames. For instance, the augmentation of the record Readme.txt is .txt, connoting a plain-content document; the expansion of Resume.wpd is .wpd, implying an archive made in WordPerfect. Naturally, Windows shrouds the expansions of enlisted record types in Explorer and on the work area, however it's ideal to have them shown.

Record expansions not just enable you to effectively figure out what sort of document a specific document is (on the grounds that symbols are never unmistakable enough), yet additionally enable you to change Windows' view of the kind of a record by essentially renaming the augmentation. Note that changing a document's augmentation doesn't really change the substance or the organization of the record, just how Windows associates with it.

To show your document augmentations, open Folder Options in Control Panel (or from Explorer's Tools menu), pick the View tab, and mood killer the Hide expansions for realized record types alternative. Snap OK when you're set.

By concealing record expansions, Microsoft wanted to make Windows simpler to utilize—an arrangement that exploded backward for a few reasons. Since just the expansions of enrolled documents are covered up, the augmentations of records that aren't yet in the File Types database are still appeared. Even all the more confounding that, when an application at long last claims a specific document type, it can appear to the unpracticed client just as the entirety of the old records of that type have been renamed. It likewise makes an "information hole" between the individuals who comprehend document types and the individuals who don't; take a stab at telling somebody whose PC still has concealed augmentations to discover Readme.txt in a catalog loaded with records. Different issues have emerged, for example, attempting to separate Excel.exe and Excel.xls in Explorer when the expansions are covered up; one record is an application and the other is a report, however they might be generally undefined.

Redo Context Menus

A setting menu (once in a while called an alternate route menu ) is the little menu that shows up when you utilize the correct mouse catch to tap on a record, envelope, application titlebar, or almost some other item on the screen. More often than not, this menu incorporates a rundown of activities proper to the item you've clicked. As it were, the alternatives accessible rely upon the specific circumstance.

The setting menu for documents, the most ordinarily utilized and altered setting menu, relies on the sort of record chosen, which is dictated by the filename augmentation. For instance, all content documents (with the .txt augmentation) will have a similar setting menu, paying little respect to what they contain or which application was utilized to make them. (This is the reason Windows gives you a harsh admonition when you attempt to change a document's expansion.)

You might be interested in
What is the output of the following code snippet? int i = 1; while (i != 9) { System.out.print(i + " "); i++; if (i == 9) { Syst
Monica [59]

Answer:

1 2 3 4 5 6 7 8 End

Explanation:

int i = 1;

while (i != 9){

  System.out.print (i + " ");

  i ++;

  if (i == 9){

     System.out.println("End");

  }

}

7 0
2 years ago
NFPA 780, Standard for the Installation of Lightning Protection Systems provides information on the installation of _____ for li
Andrews [41]

Answer:

a and b. 250.4(A)(1) Note

Explanation:

4 0
2 years ago
Virtual machines are not susceptible to the threats and malicious attacks like other operating systems.
Nonamiya [84]

Answer:

flamingo was here

Explanation:

3 0
3 years ago
What is stored in a source file, an object file, and his executable file?
neonofarm [45]
A source file has source code, what a human understands. It isn't compiled or linked.

An object file has compiled, but not linked intermediary code.

An executable file has compiled and linked code which is executable.
6 0
3 years ago
Need help not sure if I’m correct
77julia77 [94]

Answer:

First and the second option

8 0
3 years ago
Other questions:
  • An email address is made up of all of the following parts except
    13·2 answers
  • Which of the following rules should be used to keep the appropriate distance between your vehicle and the vehicle in front of yo
    10·2 answers
  • In which of the following situations may the taxpayer take an education expense on Schedule C? a. Henry, a self-employed adminis
    7·1 answer
  • 10 POINTS
    5·1 answer
  • Please select the word from the list that best fits the definition
    13·2 answers
  • So wait how do i comment on someone's answer because that would be useful ,,.
    9·2 answers
  • What methods do phishing and spoofing scammers use? List and explain methods to protect against phishing and spoofing scams.
    14·1 answer
  • When should you stop where you are, drop to the
    11·1 answer
  • Which part of the computer is responsible for managing memory allocation for all applications
    12·1 answer
  • Digital Media Equipment: Best Practices Quiz
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!