1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kisachek [45]
3 years ago
6

An image that has been saved in Tagged Image File Format (or .TIF) is A. readable only by Windows personal computers. B. a recto

format readable only by Macintosh computers. C. readable by both Windows and Macintosh computers. D. an Encapsulated PostScript format imitation.
Computers and Technology
1 answer:
olya-2409 [2.1K]3 years ago
4 0

<span>TIF is an image file saved in a high quality format with support for multiple colors, </span>layers and pages. As such, it is readable by different operating systems, not only Windows and Macintosh computers. If you find you cannot open a file with .tif format, it can be converted to .jpg although it will suffer significant quality loss.

You might be interested in
The World Wide Web is full of unstructured data. Search engines like Google, Bing and Yahoo have been doing a good job of allowi
bija089 [108]

Answer: Query

Explanation:

The Search Criteria is entered and any when a related Query is logged, it speedily bring out the linked details for exploration.

5 0
3 years ago
Your network employs basic authentication that centers on usernames and passwords. However, you have two ongoing problems. The f
Agata [3.3K]

Answer:

Using a one time password OTP and using a three factor authentication.

Explanation:

Social engineering is a form system and network attack, drafted by an attacker, to steal user credentials needed for accessing their accounts, to steal information.

Social engineering attacks like phishing, spear phishing, baiting and quid quo pro are used to fool users to giving out their user details.

One time password is an implied use of a password just once and a new password his generated to boost security. In a three factor authentication, OTP can be used as well as biometrics of a user which can not be giving away by a user to an attacker.

8 0
3 years ago
Which of the following is the most abstract?
marysya [2.9K]

D. The word "food" is the most abstract because it is the least specific and does not specify what food it is exactly.

Hope this helps!! :)

4 0
3 years ago
Read 2 more answers
During which geologic era was nearly all of Earth's land concentrated into one giant mass called Pangaea?
Scorpion4ik [409]
The answer would be Mesozoic.
HOPE THIS HELPS YOU! ^_^
6 0
3 years ago
Individually or in a group find as many different examples as you can of physical controls and displays.a. List themb. Try to gr
Angelina_Jolie [31]

Answer:

Open ended investigation

Explanation:

The above is an example of an open ended investigation. In understanding what an open ended investigation is, we first of all need to understand what open endedness means. Open endedness means whether one solution or answer is possible. In other words it means that there may be various ways and alternatives to solve or answer a question or bring solution to an investigation.

From the definition, we can deduce that an open ended investigation is a practical investigation that requires students to utilize procedural and substantive skills in arriving at conclusion through evidence gathered from open ended research or experiment(as in not close ended, not limited to ready made options, freedom to explore all possibilities). This is seen in the example question where students are asked to explore the different examples of physical controls and displays and also discuss their observations. Here students are not required to produce a predefined answer but are free to proffer their own solutions

7 0
3 years ago
Other questions:
  • In a case where electrical current leakage from the circuit occurs,
    7·2 answers
  • Leslie’s form collected a huge amount of data. Over time the employees felt that the applications slowed down. What should lesli
    12·1 answer
  • What is a main cause of a virus on a computer
    6·1 answer
  • Is your florida learners license number the same as the actual license number?
    14·2 answers
  • How to wire two separate switches &amp; lights using the same power source?
    14·1 answer
  • Wide area network (WAN) connects multiple networks that are in the same geographical locations.
    6·1 answer
  • Write a program name Dollars that calculates and displays the conversion of an entered number of dollars into currency denominat
    11·1 answer
  • Where is information stored in the computer?​
    9·1 answer
  • I need help thanks please!
    8·2 answers
  • Rachelle is writing a program that needs to calculate the cube root of a number. She is not sure how to write the code for that
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!