1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
const2013 [10]
3 years ago
10

A compressed file uses a(n) ____ as the last character in the file extension.

Computers and Technology
1 answer:
rjkz [21]3 years ago
6 0
If it was done with the compress command, capital Z
You might be interested in
The term ____ refers to a series of storage devices, such as tapes, hard drives, and cds, that are networked together to provide
Setler [38]

Answer:

SAN

Please Mark Brainliest If This Helped!

5 0
2 years ago
Given the multiplication 65535 x 32768, will the result cause overflow on a 32-bit system? Will the result need more than 32 bit
Alex

Answer:

65535 x 32768 =214 7450880

which is in the range of 32 bit unsigned integers, so there will be no overflow and we wont be in a need of more bits than 32 bit.

Explanation:

An overflow error indicates that software attempted to write down data beyond the bounds of memory.

Each program features a section of memory allocated for a stack. The stack is employed to store internal data for the program and is extremely fast and keep track of return addressing. A program may jump to a neighborhood that reads some data from the disk drive, then it returns from that routine to continue processing the info. The stack keeps track of the originating address, and therefore the program uses that for the return. Kind of like leaving breadcrumbs to seek out your way back. The stack features a limited amount of space for storing. If software attempts to access a neighborhood of the stack beyond its limits, an overflow error occurs.

• signed 32-bit integers support the range [-2147483648,2147483647]

• unsigned 32-bit integers support the range [0,4294967295]

And if you go outside this range, even temporarily, you would like to be very careful. Most cases handle the overflow technically and provide you "wraparound" or "modulo" behavior where carry bits outside the range just disappear and you're left with the low-order bits like the precise result.

In computer architecture of 32 bit, memory addresses, or other data units are those who are 32 bits (4 octets) wide. Also, 32-bit CPU and ALU architectures are those who have supported registers, address buses, or data buses of that size. 32-bit microcomputers are computers during which 32-bit microprocessors are the norm.

6 0
3 years ago
User ideas for ro blox? I prefer no numbers or underscores.
Jobisdone [24]

do what the other person said

8 0
3 years ago
How can an administrator initiate a system state recovery using the command line?
LUCKY_DIMON [66]

A leader creates a system state recovery utilizing the power cord wbadmin start system state recovery.

<h3>What is the power to start a system state restoration?</h3>
  • Windows has a built-in tool that lets you back up and repairs a server's system state, which is quick and easy to use.
  • The Wbadmin can be operated with the Start System State Backup order to create a blockage of the system state for a computer and the Start System State Recovery order to restore the system state.
  • Use the order -backuptarget:\\servername\sharedfolder\ to store system state backups.
  • Runs the power without prompts to the user.
  • The System State information reference in Backup Manager lets you support the design of your working system and vital system features such as the Registry, boot files, SYSVOL directory, and Active Directory.

To learn more about, start system state recovery, refer to:

brainly.com/question/24180931

#SPJ4

4 0
2 years ago
What is minimum requirement to enroll in an open college A) 17 on the ACT B) there is no requirement C) 2.0 GPA D) 1000 on the S
GuDViN [60]

Brainly Official Director

Hi, Thankyou for using Brainly

I am very sorry for the inconvinience that you question has not still been answered!

Please wait a few minutes and someone will answer your question shortly!

5 0
3 years ago
Other questions:
  • The process of making raw materials into a finished product is known as
    14·2 answers
  • Find the propagation delay for a signal traversing the in a metropolitan area through 200 km, at the speed of light in cable (2.
    6·1 answer
  • William has an internet connection that does not allow him to make calls when connected to the internet. what internet service c
    7·2 answers
  • You open the home page for www.alpineskihouse. On the home page, you see a link for the weather report. You want to view the wea
    6·1 answer
  • 2. Research, find and use a better (different from the simple Shift Cipher) encryption technique to encrypt a string of your cho
    15·1 answer
  • ________ programming is a method of writing software that centers on the actions that take place in a program.
    8·1 answer
  • A large gambling company needs to be able to accept high volumes of customer wagers within short timeframes for high-profile spo
    7·1 answer
  • Which statements about editing an existing Contact in Outlook are true? Check all that apply.
    9·2 answers
  • List all the steps used to search for 25 in the sequence given below. Use both (a) linear search and (b) binary search. 2, 7, 13
    7·1 answer
  • Select the WRONG statement about Slide Transitions.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!