1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NikAS [45]
3 years ago
6

When searching for an image on your computer, you should look for a file with which of the following extensions?

Computers and Technology
1 answer:
posledela3 years ago
8 0
Images use the extension "jpg"
You might be interested in
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
ou are working as a technician on a computer loaded with MS Windows. You boot the computer that has an incorrect driver loaded f
jeka94

Answer:

My Computer>>Properties>>Device Manager>>Video Card Properties>>Drivers Tab>>Roll Back Driver.

Explanation:

The user can do so by reverting the driver to the previous  version, The correct process to do so is by the Right Clicking on the computer menu and clicking device manager from the properties. In the device manager, click the properties of the video card and select the Drivers tab. In the Drivers tab, click on the Roll Back Driver. This will restore to the previous driver.

7 0
4 years ago
Help ASAP!!Choose all the basic elements of algorithms. A.Selection B.Loops C.Flow Charts D.Sequencing E.Combinations F.Iteratio
serg [7]

Answer:

b c d

Explanation:

8 0
3 years ago
Read 2 more answers
If a computer reboots itself on its own the computer might have a(n)
MissTica

Answer:

D. Software Problem

Explanation:

It could be that the software is bootlooping which will power on and off until its fixed.

4 0
3 years ago
5. If you upgrade the RAM (Random Access Memory) of you computer, what kind of enhancements will you notice? (Pick one or more c
lana66690 [7]
A

Random-access memory is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code. A random-access memory device allows data items to be read or written in almost the same amount of time irrespective of the physical location of data inside the memory.

RAM allows your computer to perform many of its everyday tasks, such as loading applications, browsing the internet, editing a spreadsheet, or experiencing the latest game. Memory also allows you to switch quickly among these tasks, remembering where you are in one task when you switch to another task.
4 0
3 years ago
Other questions:
  • What is the impact of information technology in your daily life?
    12·1 answer
  • IT investments can lead to developing IT capabilities and dynamic IT competencies, which can lead to achieving the following six
    5·1 answer
  • The fastest way to get help is to type a word or two in the search box.
    7·1 answer
  • To change the name of a field, press and hold or right-click the column heading for the field, tap or click ____ on the shortcut
    7·1 answer
  • What is known as networking in the IT field?
    8·1 answer
  • What can happen if you do not follow the directions when cooking or baking? (Give 4 examples in a sentence each)
    8·1 answer
  • Plz help fast! will mark brainliest!<br><br>List three ways that music is used in modern society.
    6·1 answer
  • Write a program that uses a while loop to calculate and print the multiples of 3 from 3 to 21. Your program should print each nu
    11·1 answer
  • What permissions are needed in order to use a work online that is in the public domain?
    8·1 answer
  • (e) The entries in each column of the array A are sorted into strictly increasing order.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!