1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
3 years ago
9

Compressing a file is also called

Computers and Technology
2 answers:
Vikentia [17]3 years ago
5 0

Answer: Transitive

Explanation: The reasoning for this answer is because it means for papers to be pusshed to gether. And that is what compressing means. So compressing a file is also called transitive.

Elan Coil [88]3 years ago
4 0

Answer:

Compressing files are also called zipped files.

Hope this helped you!

Explanation:

You might be interested in
Example of Bandwidth Analogies: using Pipe
skelet666 [1.2K]

Answer:

Bandwidth describes the maximum data transfer rate of a network or Internet connection. ... For example, a gigabit Ethernet connection has a bandwidth of 1,000 Mbps (125 megabytes per second). An Internet connection via cable modem may provide 25 Mbps of bandwidth.

7 0
2 years ago
Read 2 more answers
Why is it important to increase componentization and standardization?
liraira [26]
Jiskha help me with something similar with
8 0
3 years ago
The phrase “I suppose” helps Roosevelt create which kind of tone?
Effectus [21]

Answer:

"i suppose" negative? I'm sorry if it's wrong..

5 0
3 years ago
Read 2 more answers
write a python function that takes the largest and smallest numbers in a list, and swap them (without using min() or max() )
Akimi4 [234]

Answer:

def SwapMinMax ( myList ):

   myList.sort()

   myList[0], myList[len(myList)-1] = myList[len(myList)-1], myList[0]

   return myList

   

Explanation:

By sorting the list, you ensure the smallest element will be in the initial position in the list and the largest element will be in the final position of the list.

Using the len method on the list, we can get the length of the list, and we need to subtract 1 to get the maximum element index of the list.  Then we simply swap index 0 and the maximum index of the list.

Finally, we return the new sorted list that has swapped the positions of the lowest and highest element values.

Cheers.

8 0
3 years ago
Which of the following is not a valid technique to create a function stub?
In-s [12.5K]

An option which isn't a valid technique to create a function stub is to: D. leave the function body empty.

<h3>What is a function stub?</h3>

A function stub can be defined as a type of function that can be called safely without an error. However, a function stub has no definition because it doesn't actually perform any action when called.

In this context, leaving the function body empty is an option which isn't a valid technique to create a function stub.

Read more on function stub here: brainly.com/question/17214711

#SPJ1

6 0
2 years ago
Other questions:
  • Which sentences in the passage correctly describe a function?
    11·1 answer
  • The Company management has asked that you compare the OSSTMM and the PTES to determine which methodology to select for internal
    13·1 answer
  • An array of integers named parkingTickets has been declared and initialized to the number of parking tickets given out by the ci
    14·1 answer
  • Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
    6·1 answer
  • A company purchased a high-quality color laser printer to print color brochures and sales proposals. The printer is connected to
    5·1 answer
  • A 9-year old male castrated Westie presents on emergency after being rescued from a house fire. On presentation, the dog has a r
    9·1 answer
  • Which of the following is true of horror films like Insidious and The Conjuring?
    15·2 answers
  • In the space provided, analyze the pros and cons of becoming a member of an artistic guild. Your answer should be at least 150 w
    12·1 answer
  • How the data is converted into the information?​
    8·2 answers
  • If you're connected to a switch and your NIC is in promiscuous mode, what traffic would you be able to capture
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!