1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alecsey [184]
3 years ago
8

How will you identify a file type on your computer? A file type is the standard used to ( A. create data B. code data C. store d

ata) and information in a computer. All file types have unique( A. names B. codes C. file extenstion) that determine which program to use to open a particular file and to access its data.
Computers and Technology
1 answer:
Yuliya22 [10]3 years ago
4 0

Answer:

  • The type of file can be known by its extension.
  • Option C: A file type is the standard used to store data.
  • Option C:  All file types have unique file extension.

Explanation:

Files are the collection of data or records. This data can be of any kind such as pictures, videos, documents, executable file etc. Each file has it own unique type that is known by its extension.

File extensions are actually defined as suffix having 2 to 4 words after the file name. File extensions are used in order to help the Operating system to choose the software that supports the file. Different files have different extensions. For example:

  • doc/docx for word file
  • jpg for image file
  • xls/xlsx for excel file
  • exe for executable file

So each file has its own identity and hence a unique extension.

i hope it will help you!

You might be interested in
Which of these is a benefit of using the Sort option?​
Reika [66]

There are many benefits of using the shot options in Excel. Some benefits are allowing you to short by number,date,color, letter, columns,or text. This benefits the user because it allows the user to bring data up more easily.

I hope this answers is helpful

3 0
3 years ago
PACIFIC NORTHWEST
poizon [28]

Answer:

b) Tufts University Nutrition Web Page

Explanation:

The site that most likely provides a balanced information on eating a balanced diet is the Tufts University Nutrition Web Page

Tufts University is a moderate size, leading private research American higher education institution located in Massachusetts that offers degree programs on Food and Nutrition Policy and Programs

By comparison with the other sites which are;

a) Pork Producers Nutrition Page, which is expected to be related with pork production pork producers and pork consumers, based on the title focus, the information provided by the page is therefore, not meant for general use and therefore not meant to be balanced

c) The Eat What You Want Page, based on the of the page title literally which suggest the liberty for a user to eat what they want to eat does not appear to call for the input of an expert advice on nutrition, and therefore is not balanced.

8 0
3 years ago
Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the
Agata [3.3K]

There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.

<h3>What is public and private key in SSL?</h3>

These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).

Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.

Learn more about  public/private key from

brainly.com/question/8782374

3 0
2 years ago
A troubleshooting strategy that removes components from a system in order to get back to a basic configuration is called module
Semmy [17]

Answer:

B. False.

Explanation:

Troubleshooting strategy is a technique used to discover the cause of defeat in a system. The technician must learn to improvise with these strategies to solve a system problems.

Module replacement is a type of troubleshooting strategy that replaces a component with unknown status with another component with good status to determine the cause of the problem.

Removing a component from a system to get back to its basic configuration helps to eliminate factors that may make a computer problem difficult to solve.

3 0
3 years ago
You want to draw a rectangle over the moon you added to your slide and then move it behind the moon. You want it to look like a
Ray Of Light [21]
I choose Home and it’s a good thing to have
5 0
3 years ago
Other questions:
  • A(n) ____ network uses a central cable to which all network devices connect.
    13·1 answer
  • When at the rightmost cell in a row, press the ENTER key to move to the first cell in the next row; do not press the TAB key.
    14·1 answer
  • Define a class named ComparableSquare that extends Square (defined above) and implements Comparable. Implement the compareTo met
    7·1 answer
  • Which of the following is NOT a useful strategy when making an informed purchase ?
    7·1 answer
  • Identify the following as True or False: (1) Naive Bayes is a linear classifier. (2) SVMs are only usable when the classes are l
    8·1 answer
  • What do we call the input and output devices that are connected externally to the computer?
    10·2 answers
  • Iaz005<br> plz make a new zoom
    8·2 answers
  • SmartArt is especially useful for which types of objects? Check all that apply.
    10·2 answers
  • 8.
    9·1 answer
  • The Carolina International School is more Earth-friendly than typical schools because
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!