1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
4 years ago
14

What image format should be used to keep the file size manageable​

Computers and Technology
1 answer:
Verizon [17]4 years ago
6 0

The most simple and reliable image file formats out there are png and jpg

You might be interested in
Stuck on where to go with this one.
garri49 [273]

1

7

6 I think how many do you have to answer

8 0
3 years ago
E) Point out the errors( if any) and correct them:-
leonid [27]

Explanation:

double e-d/5.6;is wrong it should return to c

5 0
3 years ago
Color.
Studentka2010 [4]
Depends on the programming language to my knowledge but I know in a few the code all revolves around FILL to change the internal color of an object.
3 0
3 years ago
Angela wants to give her press release an attractive and cohesive appearance. How can she quickly format her press release so it
I am Lyosha [343]

Answer:

Press release tools on websites

Explanation:

There are several tools on websites that provide quick press release. It is possible to directly select the style from several choices. Each style has own fonts and colors however, it is possible to change them.  

Step by step;

Angela may enter the website that provides press release

Then can select a theme with fonts and colors

Then she can put her work

It is ready to publish

8 0
4 years ago
Play-e-ball, a company that creates games for gaming consoles, gathers data from the information systems of its partners, suppli
ad-work [718]

Answer:

Option B

Explanation:

It is the perfect example of BI(Business Intelligence).

7 0
3 years ago
Other questions:
  • What is cryptocurrency ? I need to do a research one it please help!
    6·1 answer
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • An attempt to exploit a vulnerability of a computer or network component is the definition of ________.
    15·2 answers
  • Question 3.3. Which of the following is NOT a computer protocol? FTP SMTP ISP TCP
    11·1 answer
  • The physical parts of the computer that you can see and touch are called______.
    5·1 answer
  • .doc What is the difference between a skilled hacker and an unskilled hacker, other than skill levels? How does the protection a
    5·1 answer
  • Write the SQL query that would search a table called Movies and return the titles of movies that were made in 1975.
    7·1 answer
  • Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network comprom
    5·1 answer
  • It means fruit- trees garden.
    8·1 answer
  • what motivators should the action section of your sales message include? check all that apply. a satisfaction guarantee a proof
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!