1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
13

Which file types have .exe and .png as their extensions?

Computers and Technology
2 answers:
uysha [10]3 years ago
6 0
.png are for photos and .exe are for programs.
egoroff_w [7]3 years ago
4 0

It won't be photos it'll be graphs

You might be interested in
Consider the recursive method whose definition appear below. Why? public static String mysteryString (String s){ if(s.length()==
Marizza181 [45]

Answer:

retupmoc

Explanation:

1.) Anwser will be retupmoc

because

public static String mysteryString(String s){

if(s.length() == 1){

return s;

}

else{

return s.substring(s.length() -1) + mysteryString(s.substring(0, s.length()-1));

}

}

In this program input is "computer" . So the function mysteryString(String s) it does

return s.substring(s.length() -1) + mysteryString(s.substring(0, s.length()-1));

so when it enters the first time ??s.substring(s.length() -1) and it will be give you 'r' then it calls the function recursively by reducing the string length by one . So next time it calls the mysteryString function with string "compute" and next time it calls return s.substring(s.length()-1)? + mysteryString(s.substring(0,s.length-1)) so this time it gives "e" and calls the function again recursively . It keeps on doing till it matched the base case.

so it returns "retupmoc".

6 0
3 years ago
You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what
Lynna [10]

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

7 0
3 years ago
PLEASE HURRY!!
PtichkaEL [24]

Answer: I would say the first one

Explanation: I have never seen an interactive button for use in autoformatting at least on a presentation

8 0
3 years ago
Make a Backwards Phonebook from a Regular Phonebook
Dima020 [189]

Answer:

Code in Python is given. Take note of the instruction in bold font

Explanation:

You will need to update the below two lines in your system based on the file path -

backward_phone_number('F:\\phone_number_input.txt','F:\\phone_number_output.txt')

def backward_phone_number(input_file,output_file):

   ph_num_dictionary={}

   entries=[]

   #########################################################

   with open(input_file,'r') as read_file:

       entries=read_file.readlines()[1:]

   for entry in entries:

       ph_num_name=entry.split()

       ph_number=ph_num_name[1].strip()

       name=ph_num_name[0].strip()

       if ph_num_dictionary.get(ph_number)==None:

           name_list=[name]

           ph_num_dictionary[ph_number]=name_list

       else:

           ph_num_dictionary.get(ph_number).append(name)

   #########################################################

   ph_num_dictionary = dict(sorted(ph_num_dictionary.items(),key=lambda pair:pair[0]))

   with open(output_file,'w+') as write_file:

       write_file.write('Telephone Number\tName\r\n')

       for num,name in ph_num_dictionary.items():

           if len(name)==1:

               write_file.write(num+'\t'+name[0]+'\r\n')

           else:

               name.sort()

               for person in name:

                   write_file.write(num + '\t' + person + '\r\n')

backward_phone_number('F:\\phone_number_input.txt','F:\\phone_number_output.txt')

7 0
3 years ago
Mbr and guid advantages and disadvantages
photoshop1234 [79]

Answer:

GPT does not have limitations in terms of the number of partitions. While you can have only 4 primary partitions in MBR, you can have up to 128 partitions in Windows using the GPT partition layout. GPT partition and boot data are more secure than MBR. MBR stores data in one place only.

Explanation:

I took the test

8 0
2 years ago
Other questions:
  • From the binary search algorithm, it follows that every iteration of the while loop cuts the size of the search list by half.
    13·1 answer
  • • What is the difference between primary storage, secondary storage, and off-line storage
    10·1 answer
  • In the game of economics, producers look to technological improvements to increase which of the following?
    7·2 answers
  • A lost update occurs when
    15·1 answer
  • The ____ option must be used when running a program in order to see the results of assert statements.
    7·1 answer
  • Can someone help me with this lab assignment? I really do not know what should I do?
    5·1 answer
  • What does the top level domain in a url inducate? A. The organization or company that owns the website. B. The organization or c
    6·2 answers
  • Where can formatting features be found ?! Need help asp !‍♀️
    9·1 answer
  • Select the correct answer.
    14·1 answer
  • Question 6 options: This is a category or partitioned group of the small units of a programming language include its numeric lit
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!