1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NikAS [45]
3 years ago
6

When searching for an image on your computer, you should look for a file with which of the following extensions?

Computers and Technology
1 answer:
posledela3 years ago
8 0
Images use the extension "jpg"
You might be interested in
Why do organizations create multiple databases?
igomit [66]
Just in case one database gets hacked or crashes they have another to run on
5 0
4 years ago
Which is a safe practice when online
Kay [80]

Answer:

I don't know if there are choices but these are couple that i think would be right. Don't give out personal info, have a complex password and don't give it out to anyone, don't click on random pop up adds, and use a firewall

Explanation:

7 0
3 years ago
Read 2 more answers
Which shortcut brings up the Print screen?
sashaice [31]

The answer is alt + prt sc

5 0
3 years ago
Read 2 more answers
Help please , I'm marking the brainliest
NNADVOKAT [17]

Answer:

Not sure about the first one

Second is False

Third is True

I think four is False

Five is Decor

6 is Content Page

Explanation:

8 0
2 years ago
A penetration testing manager is contributing to an RFP for the purchase of a new platform. The manager has provided the followi
pochemuha

The manager has provided the following requirements <u>Password cracker: </u>

E. Password cracker

<u>Explanation:</u>

MITM is used to protect from hackers where they can hack the web site and misused the data. Basically man is in middle that monitors the network traffics between to tcpip and address and login as unauthorized person.

As RFP is a bidding process for purchase new product or new platform with complete document in details.

End user has to take care of hackers attack and make sure it is protected with all security holes.

Fuzzer is tool where send user data and check the security vulnerabilities and make sure it is protected.

It is not considered as high accuracy.

5 0
4 years ago
Other questions:
  • What keyboard shortcut keys selects cell A1
    12·1 answer
  • When computer manufacturers overcame the enormous 13,000 Chinese character barrier by creating a workable keyboard through voice
    15·1 answer
  • A file to which information is written is referred to as a(n) ____ file.
    8·1 answer
  • Ted reads a sentence: The man said that it would take 10 to 12 days for a reply. He believes the hyphen symbol can replace the w
    11·1 answer
  • Once a graph has been created, you would need to start over to make any changes to it?
    5·1 answer
  • What is a GUI?
    11·1 answer
  • Consider the following code snippet: int count = 0; int[][] numarray = new int[2][3]; for (int i = 0; i &lt; 3; i++) { for (int
    15·1 answer
  • What are digital forensic techniques? A. Identifying, extracting, and evaluating evidence obtained from digital media such as co
    11·1 answer
  • For things like school, you should have a more serious:
    11·1 answer
  • Structured query language (sql) enables data analysts to _____ the information in a database.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!