1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
3 years ago
9

Instructions:Select the correct answer from each drop-down menu. Which file types have .exe and .png as their extensions?

Computers and Technology
2 answers:
Lina20 [59]3 years ago
6 0
Programs are a mix of many different .exe files "talking" to each other on how to make the program look feel and behave as user interface is applied and .png images are usually used in photo shop to keep image transparency when you crop an image.
Gwar [14]3 years ago
4 0
Programs are typically .exe and images are .png
You might be interested in
Supplemental security software (such as anti-virus [anti-malware]) is: Generally considered essential for all desktops and lapto
k0ka [10]

Answer:

Explanation:

With an anti-virus, we can search, detect, and delete malware like spyware, worms, Trojans, rootkits, pseudoviruses, etc.

An anti-virus can detect virus with several methods like:

  • Digital signature
  • Heuristic detection
  • Behavior detection
  • Sandbox detection

Is necessary for personal laptops and desktops, even in companies hardware.

7 0
3 years ago
For the past five days, the Howard family has traveled these miles: 389;126;419;93; and 394. Find the range and how. Show all yo
Fofino [41]
The answer is 326.

Range is found by subtracting the smallest number in the data set from the largest number.

Highest number: 419
Lowest number: 93

419-93
=326

(Next time make sure to post this under the Mathematics section.)
5 0
3 years ago
Network services use to define a set of rules that govern how devices communicate and the data formats used in a network.
devlian [24]
The correct answer is protocols.
Protocols are rules and instructions as to how devices should function. Each of these devices has its own protocols about its inner workings that regulate how that particular device is going to work and function in real life. Without these protocols, the device wouldn't be able to work.
7 0
3 years ago
What's the differences between jojoy and moddroid???
PtichkaEL [24]

Answer:

?

Explanation:

5 0
2 years ago
GIVING 10 or 20 POINTS for brainliest HELP ASAP!! Instructions Click the links to open the resources below. These resources will
Gnesinka [82]

Answer:

sorry it wont let me do it

Explanation:

5 0
2 years ago
Other questions:
  • Write a program that reads in text from standard input (hint: use Scanner) and prints out the number of words in the text. For t
    5·1 answer
  • PLEASE HELP I WILL REWARD YOU
    11·1 answer
  • A transcript must bear a(n)___ to be considered official
    15·2 answers
  • PLEASE HELP ASAP
    10·2 answers
  • What does it mean to say that two variables are negatively correlated?
    6·1 answer
  • What type of encryption is this "1d83ad29cf19ff399445aff3a0da74d9"
    5·1 answer
  • The Spanning Tree Protocol operates at the Network layer of the OSI model.
    13·1 answer
  • Send me the answers<br>​
    15·1 answer
  • True or false: The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that int
    10·1 answer
  • State the function of the <br> BIOS,​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!