1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
3 years ago
9

Compressing a file is also called

Computers and Technology
2 answers:
Vikentia [17]3 years ago
5 0

Answer: Transitive

Explanation: The reasoning for this answer is because it means for papers to be pusshed to gether. And that is what compressing means. So compressing a file is also called transitive.

Elan Coil [88]3 years ago
4 0

Answer:

Compressing files are also called zipped files.

Hope this helped you!

Explanation:

You might be interested in
In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
Ugo [173]

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

4 0
3 years ago
Which of the following mountain ranges stretches from Alabama to Canada?
Vikki [24]
The Appalachian Mountains
4 0
3 years ago
You are driving in the right lane of a municipal road the road has three lanes in your direction ahead of you in the lane to you
Mrrafil [7]
Pull Over. Do NOT Try to push the brake or try swerving with the steering wheel. Slowly pull to the side
7 0
3 years ago
Read 2 more answers
Alarm filtering is alarm clustering that may be based on combinations of frequency, similarity in attack signature, similarity i
Angelina_Jolie [31]
Wait what is the question? All you are saying is a fact. :|
4 0
3 years ago
What is the name of a computer or application program that intercepts user requests from the internal secure network and then pr
defon
A proxy server is a server that intercepts user requests from the internal secure network and then processes that request on behalf of the user.
The proxy server can be a computer or application program<span> that gets the requests from clients and seeks resources from other </span>servers. It is a <span>intermediary point between the end user and the backbone network.</span>
8 0
3 years ago
Other questions:
  • A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company n
    9·2 answers
  • In what year was google launched on the web?
    14·1 answer
  • What are three steps to use to research relevant information on the internet? (Site 1)
    13·2 answers
  • Frank lives in an area that experiences frequent thunderstorms. What precautionary measure should he adopt?
    5·1 answer
  • What is the description of a computer ram?
    7·1 answer
  • Which of the following allows data to coordinate activity between devices? Select one: a. Address bus b. Collisions c. Data bus
    10·1 answer
  • Which of these trade-offs occur in a memory hierarchy?
    15·1 answer
  • What is the data and information with example? ​
    9·1 answer
  • Gray London is a retired race car driver who helped Dale Earnhardt, Jr. get his start. He is writing a book and making a video a
    9·1 answer
  • Question is in photo
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!