1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
velikii [3]
3 years ago
11

Match the file extensions to the file types. Some file types may be used more than once.

Computers and Technology
1 answer:
Elena L [17]3 years ago
7 0

Answer:

1234 and free points

Explanation:

You might be interested in
Charles Mott works for a company called VeriSign that acts a trusted third party to verify information. One of Charles' largest
balu736 [363]

Answer:

Option (B) i.e., Certificate authority is the correct option to the following question.

Explanation:

The following option is correct because it an organization or company who validating the identification of that object that exists and it also verifies the information of the third party.

Option A is incorrect because it is the tool or software that protects the system from the outsiders or the malware.

Option b is incorrect because Online certificate is issued for any software or application or the certification in the field of study.

8 0
3 years ago
The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the op
Arturiano [62]

Answer:

custody.

I hope I could help

4 0
2 years ago
State the Limitations of the first generation of computers​
Ivanshal [37]

Answer:

The limitations of the first generation of computer are:-

•The operating speed was very low.

•Power consumption was very high.

•They required large space for installation.

<h2>Hope it helps you.</h2>
3 0
3 years ago
___________ is some danger that can exploit a vulnerability.
andreyandreev [35.5K]

<u>Threat </u>is some danger that can exploit a vulnerability.

<h3>What is Threat?</h3>

Threat  is seen as Anything that can be able to take advantage of a vulnerability, intentionally as well as  accidentally, and take or damage, the  asset of a person.

Note that a threat is that which a person or firm is protect against and Vulnerability is seen as Weaknesses.

Therefore, <u>Threat </u>is some danger that can exploit a vulnerability.

Learn more about vulnerability from

brainly.com/question/25633298

#SPJ1

8 0
2 years ago
What is the most efficient way to include a space after each paragraph
3241004551 [841]

To skip a line, then write the rest like this!


See? Good spacing, right?

4 0
3 years ago
Other questions:
  • A customer has a web server for a small business. The business uses both wired and wireless networking. A Linksys WRT300N wirele
    13·1 answer
  • A program that coaches you at each step in the process is said to have a(n)
    12·2 answers
  • 1. You have recently been hired by a leading firm, which provides information management solutions to large corporations. As a n
    12·2 answers
  • 4. Together, what do the divisions of the DHSMV do? A. Make sure lines are long B. Use more money than other government organiza
    14·1 answer
  • What icon is usually used to indicate an attachment feature?
    14·2 answers
  • And then what happened,Paul Revere rhyme
    14·2 answers
  • There is a renewed focus among today’s parents on providing food to their family.
    6·1 answer
  • Type the correct answer in each box. Spell all words correctly.
    14·2 answers
  • If a student passes off an author’s work as his or her own, the student has
    6·1 answer
  • Please select the word from the list that best fits the definition Asking for review material for a test
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!