1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erik [133]
3 years ago
13

Stefan is finalizing his presentation by adding media files and preparing it for distribution. Stefan knows that saving a presen

tation as a(n) ____ file enables readers to see the slides, but not edit them.
Computers and Technology
1 answer:
blsea [12.9K]3 years ago
3 0
The answer would be XPS
You might be interested in
4
bixtya [17]

Answer: its keyword

Explanation:

4 0
4 years ago
The SETI (Search for Extraterrestrial Intelligence) project collected vast amounts of data that needed processing. SETI was one
I am Lyosha [343]

Answer:

grid computing

Explanation:

Based on the information provided within the question it can be said that this technology is typically known as grid computing. Like mentioned in the question, this is a type of processor architecture in which various computer resources are combines from different domains in order to work together towards a common main objective. Which is exactly what SETI has done by using many individual's computers to essentially create one supercomputer capable of handling all the data.

6 0
3 years ago
IRQ 0 interrupt have _______________ priority<br> ? low<br> ? medium<br> ? highest<br> ? lowest
tekilochka [14]

Answer:

Highest

Explanation:

A interrupt request / IRQ is in which instructions are sent to Cpu and uses an interrupt handler to run distinct program . Hardware interrupts are used to manage occurrences such as obtaining modem or network card information, important presses, or mouse motions.

  • Interrupt request 0. – it is a system timer (can not be altered)
  • Interrupt request 1 – keyboard controller (can not be changed)
  • Interrupt request 2 – cascaded IRQ 8–15 signals (any device configured to use IRQ 2 will genuinely use IRQ 9)
  • Interrupt request 3 – serial port 2 controller
  • Interrupt request 4 –  serial port 1 controller
  • Interrupt request 5 –parallel port 2 and 3
  •  Interrupt request 6 - floppy disk controller
  •  Interrupt request 7 –parallel port 1. If a printer is not present, it is used for printers or for any parallel port. It can also possibly be shared with a secondary sound card with cautious port management.

As interrupt number increases priority level decreases, Priority level 0 is the highest priority level .

4 0
3 years ago
Def sum_divisors(n): sum =1 # Return the sum of all divisors of n, not including n x=int(n**0.5) for i in range(2,(x//1)+1): if
Novosadov [1.4K]

Answer:

This is a python program that counts the number of divisors of a given number and calculates the sum of the divisors.

Explanation:

The first line defines a function "sum_divisors" with an argument "n". The square root of the argument is converted to integer and assigned to the variable "x", then a for loop is used to iterate through the range 2 to the calculated nth number of divisors in the argument.The return keyword returns the sum value.

The function is called with several arguments and printed with the print function.

6 0
3 years ago
The presentation ____ determines the formatting characteristics of fonts and colors.
leonid [27]
The presentation theme determines the formatting characteristics of fonts and colors.
6 0
3 years ago
Read 2 more answers
Other questions:
  • In your presentation you added a text box to?
    5·1 answer
  • A compound document contains _______ from different applications.
    12·2 answers
  • Holly Carpenter argues that technology may actually prevent some kinds of evolution that would benefit humans. Do you agree with
    8·2 answers
  • How many valence electrons are present in the atom of the atomic number of 12?
    10·1 answer
  • WHERE WAS THE CHEESEBURGER INVENTED?
    9·1 answer
  • Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
    11·1 answer
  • Complete the statement using the correct term.
    10·1 answer
  • Create a Flowchart and write pseudocode for a program that allows the user to enter two integer values: a and b.
    8·1 answer
  • A friend asks you to look over the code for an adventure game and help figure out why it won’t work. Which of these options is s
    5·2 answers
  • From the time users first visit a new website, or view a new media piece, how much time will they spend on the site before they
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!