1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KIM [24]
3 years ago
11

Judy forgot where she saved a certain file on her computer. Therefor, she searches for all files with a jpg file extension. Whic

h type of file is she searching for?
Computers and Technology
2 answers:
Keith_Richards [23]3 years ago
6 0
What are these files anyways
oee [108]3 years ago
4 0
She is looking for a jpg file.
You might be interested in
Wht is RAM called Random Access memory and ROM IS called Read only memory​
nasty-shy [4]

Answer: Computer memory is of two basic type – Primary memory(RAM and ROM) and Secondary memory(hard drive,CD,etc.). Random Access Memory (RAM) is primary-volatile memory and Read Only Memory (ROM) is primary-non-volatile memory.

Explanation: Hope this helps :)

6 0
3 years ago
Apple users tend to like the company and love its products. Apple has successfully nurtured this __________ component of its cus
kow [346]

Answer:

Affective

Explanation:

Affective Component − This is the second model of customers attitude. This consists of a person’s feelings, sentiments, and emotions for a particular brand or product. They treat them as the primary criteria for the purpose of evaluation. The state of mind also plays a major role, like the sadness, happiness, anger, or stress, which also affects the attitude of a consumer.

7 0
3 years ago
Really desperate!
bija089 [108]

Answer: Sorry to break this to you but you can't.

Explanation:

7 0
3 years ago
Read 2 more answers
Select the correct answer from the drop-down menu.
Eva8 [605]

Answer:

1. diagraph

2.analog

maybe

3 0
2 years ago
If the firewall is configured for credential phishing prevention using the "Domain Credential Filter" method, which login will b
ahrayia [7]

Mapping to the IP address of the logged-in user<u>-will detect  a credential theft</u>

<u></u>

Explanation:

In the "Domain Credential Filter" method the firewall matches the username and the password submitted by the user with the corporate user id and password.

In order to match the credentials submitted by the user the firewalls retrieves data from the bloom filter which is further connected  to windows  User-ID credential service add-on.

The firewall also looks in its Mapping Table for the IP address of the logged-in user

3 0
3 years ago
Other questions:
  • Which principle of CSR requires that a business state facts fully and accurately?
    8·1 answer
  • Stuart wants to delete some text from a slide. What should Stuart do?A. From the Review tab, choose Highlight text and then pres
    7·2 answers
  • Match each scenario to the absolute value expression that describes it. 1. the distance moved when going backwards five spaces i
    13·2 answers
  • What trade-offs do you think engineers make between functionality, safety and aesthetics when building a real bridge?
    9·1 answer
  • Which is a circuit board located behind an LCD screen on a laptop?
    7·1 answer
  • When you save a file for the first time, you must ____.
    15·2 answers
  • HELPPPPPPPP
    12·2 answers
  • Avi does not want to save his internet browsing details on his computer. What should he do?
    11·1 answer
  • For each of the innovations below. Decide if it is a computing innovation or not. Part 3 Continued.
    7·1 answer
  • your manager asks you to set up a secure network connection at a remote site to move over some backups which protocol would you
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!