1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
const2013 [10]
3 years ago
10

A compressed file uses a(n) ____ as the last character in the file extension.

Computers and Technology
1 answer:
rjkz [21]3 years ago
6 0
If it was done with the compress command, capital Z
You might be interested in
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (a
allsm [11]

Answer:

The code is below. The output is "Eric went to Chipotle to buy 12 different types of Cars"

Explanation:

import java.util.scanner;

public class labprogram {

    public static void main (string [ ] args) {

    scanner scnr = new scanner (system.in) ;

    string firstname;

    string genericlocation;

    int wholenumber;

    string pluralNoun;

   firstName = scnr.next();

   genericLocation = scnr.next();

   wholeNumner = scnr.nextInt();

   pluralNoun = scnr.nextLine();

   system.output.println(firstname + " went to " + genericlocation + " to buy " + wholenumber + " different types of " + pluralnoun + " . ");

}

 }

6 0
2 years ago
4.11 lesson practice edhesive
spin [16.1K]

Answer:

the last one

Explanation:

6 0
2 years ago
Read 2 more answers
Your baby brother has found the hammer and is eagerly eyeing one of the boxes. Describe and analyze an algorithm to determine if
erastovalidia [21]

Answer:

Question is incomplete.

Assuming the below info to complete the question

You have a collection of n lockboxes and m gold keys. Each key unlocks at most one box. Without a matching key, the only way to open a box is to smash it with a hammer. Your baby brother has locked all your keys inside the boxes! Luckily, you know which keys (if any) are inside each box.

Detailed answer is written in explanation field.

Explanation:

We have to find the reachability using the directed graph G = (V, E)

In this V are boxes are considered to be non empty and it may contain key.

Edges E will have keys .

G will have directed edge b1b2 if in-case box b1 will have key to box b2 and box b1 contains one key in it.

Suppose if a key opens empty box or doesn’t contain useful key means can’t open anything , then it doesn’t belongs to any edge.

Now, If baby brother has chosen box B, then we have to estimate for other boxes reachability from B in Graph G.

If and only if all other boxes have directed path from box B then just by smashing box B we can get the key to box b1 till last box and we can unlock those.

After first search from B we can start marking all other vertex of graph G.

So algorithm will be O ( V +E ) = O (n+m) time.

7 0
3 years ago
Compare and contrast the role that business users play when software is developed using Waterfall and Agile software development
qaws [65]

Answer: Both Agile and waterfall model are software development models to deliver a final outcome in the form of a software product. Waterfall model is sequential process with the requirements beings rigid and defined before beginning the software development.

Agile method basically  concerned with the requirements of the client. Here both testing and development is carried out at the same time.

Explanation:

More differences between the two include :

Waterfall model is easy to manage whereas in agile model as the the client requirements changes and wants more functionalities is becomes a bit more difficult to manage. the role of project manager is very crucial in waterfall model whereas the role of developers ans testers is more important in Agile model.

8 0
3 years ago
What is TCP/IP's Transport layer's primary duty?
lorasvet [3.4K]

Answer:

 The TCP/IP is the transmission control protocol and internet protocol and in the TCP/IP model the transport layer is the second layer.

The primary responsibility of this layer is that it is basically used to deliver messages to the host and that is why it is known as end to end layer.

It basically provide the point to point connection between the destination to server host for delivering the various types of the services efficiently and reliably.

In the TCP/IP model the transport layer are basically responsible for transferring the data or service error free between the server to destination host.

3 0
3 years ago
Other questions:
  • How to get 60 fps pubg​
    9·2 answers
  • Which of the following contains information about which keywords are bringing visitors to your website?
    8·1 answer
  • PLEASE HELP!!!!
    7·1 answer
  • rray testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cred
    5·1 answer
  • A DESKTOP COMPUTER (NAMED WORKSTATION22) CAN'T CONNECT TO THE NETWORK. A NETWORK CARD WAS PURCHASED WITHOUT DOCUMENTATION OR DRI
    14·1 answer
  • Write a program to randomly fill an array of float of 10 elements (use the rand() function and make sure to use #include ) in ma
    11·1 answer
  • What are some of the ways you can use bitlocker encryption? (choose all that apply?
    10·1 answer
  • Question 1:
    5·1 answer
  • 100 points for this and brainlyist lol
    11·1 answer
  • In two to three sentences, define "home row" and explain why it is important.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!