1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
3 years ago
14

How will you identify a file type on your computer? A file type is the standard used to and information in a computer. All file

types have unique that determine which program to use to open a particular file and to access its data.
Computers and Technology
2 answers:
maks197457 [2]3 years ago
4 0
If you are in your file explorer:
1. Right click on the file that you want to know what file it is
2. slect "properties"
3. It should show "file type:" 
pav-90 [236]3 years ago
3 0

Answer:

To identify a file type, just place your mouse cursor over a target file and right click. An option list will pop up. Select "Properties" from the option list. A "Properties" window will appear. In the "General" tab, look for "Type of file" to identify the file type. You will also see extension of the current file type.

Besides, right below the "Type of file", there is an option "Open with" along with a default program set to open the file. From there we know the current program that used to open that particular file.

You might be interested in
____________ is a widely accepted international best practices framework for implementing information systems security.
balandron [24]

Answer:

Control Objectives for Information and related Technology (COBIT)

Explanation:

COBIT is a framework developed by the ISACA for managing and supervising Information Technology processes. Such kinds of frameworks allow companies to position themselves with the expectations that they and their clients expect. COBIT's aim is to provide management and business process owners with an IT control and governance model that helps deliver value from IT and identify and handle the IT-related risks. It helps bridge the gap between business needs, control requirements and technical issues. It is a paradigm of control for addressing the IT governance requirements and maintaining the security of knowledge and information systems. COBIT emphasizes on what allows processes to work well.

8 0
3 years ago
Fill in the word to complete the sentence.
german

Answer:

Service Layer

Explanation:

7 0
2 years ago
Jerry has received an email on his company’s email system. The email is in regard to a new update the company plans to implement
Alla [95]

Answer:

The type of attack is <em>Phising Email.</em>

<em />

Explanation:

Phishing emails are mails purportedly sent by a company staff seeking some vital information from an employee or employees. Criminals often use such method to get sensitive information about a company and its details from its own employees who may not be able to differentiate such mails from the normal company mails. Thus the mail that Jerry receives regarding a new update the administrators of his company intends to implement can be regarded as a Phishing email.

5 0
3 years ago
Given the following adjacency matrix, what is the approximate rank vector after one iteration of the power iteration method (use
ValentinkaMS [17]

Note: The matrix referred to in the question is: M = \left[\begin{array}{ccc}1/2&1/3&0\\1/2&1/3&0\\0&1/3&1\end{array}\right]

Answer:

a) [5/18, 5/18, 4/9]'

Explanation:

The adjacency matrix is  M = \left[\begin{array}{ccc}1/2&1/3&0\\1/2&1/3&0\\0&1/3&1\end{array}\right]

To start the power iteration, let us start with an initial non zero approximation,

X_o = \left[\begin{array}{ccc}1\\1\\1\end{array}\right]

To get the rank vector for the first Iteration:

X_1 = MX_0

X_1 =  \left[\begin{array}{ccc}1/2&1/3&0\\1/2&1/3&0\\0&1/3&1\end{array}\right]\left[\begin{array}{ccc}1\\1\\1\end{array}\right] \\\\X_1 = \left[\begin{array}{ccc}5/6\\5/6\\4/3\end{array}\right]\\

Multiplying the above matrix by 1/3

X_1 = \left[\begin{array}{ccc}5/18\\5/18\\4/9\end{array}\right]

8 0
3 years ago
A pointing device used mainly for computer games is known as
kolbaska11 [484]

Answer: Joystick is the only one that makes sense, a stylus and digitizer are both used on drawing tablets, not computer games.

5 0
2 years ago
Other questions:
  • What is a computer??????????????????????????????????????????????????????????
    12·2 answers
  • what evidence supports the claims that the Taj Mahal is a symbol of historical and cultural glory as well as an architectural ma
    8·1 answer
  • Litmus-type test strips are used to test coolant for freeze protection and ?
    12·1 answer
  • 3. If the typical balance on Lucy's credit card is $750 and the interest rate (APR) on her credit card is 16%, how much in inter
    11·2 answers
  • 2. Billys teacher asked him to type a report about asian food. Which paragraph format should he use?
    12·2 answers
  • Which port-authentication network access control standard forces devices to go through a full authentication, authorization, and
    13·1 answer
  • In Android system, an e-mail application that shows a list of new emails, composes an email, or reads an email is called (A) Ser
    9·1 answer
  • Lamp is an acronym for a complete solution of open source software that goes together to build a general purpose web server. whi
    13·1 answer
  • Project manager Erica is discussing with her team to prepare a document to describe the deliverables and goals of a software pro
    13·1 answer
  • a benefit of cloud computing is scaling up or down as demand for your services increases or decreases. the word that is most ass
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!