1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
3 years ago
8

When searching for an image on your computer, you should look for a file with which of the following extensions?

Computers and Technology
1 answer:
qwelly [4]3 years ago
5 0
Png, jpeg, and if it's animated a GIF
You might be interested in
1,2,3,4,5,6,7,8,9,10 – Best case - Sorted in ascending order
Pepsi [2]

Using the knowledge in computational language in python it is possible to write a code that from a random number draw creates an order of increasing numbers

<h3>Writting the code in python:</h3>

<em>def shellSort(array, n):</em>

<em>    # Rearrange elements at each n/2, n/4, n/8, ... intervals</em>

<em>    interval = n // 2</em>

<em>    while interval > 0:</em>

<em>        for i in range(interval, n):</em>

<em>            temp = array[i]</em>

<em>            j = i</em>

<em>            while j >= interval and array[j - interval] > temp:</em>

<em>                array[j] = array[j - interval]</em>

<em>                j -= interval</em>

<em>            array[j] = temp</em>

<em>        interval //= 2</em>

<em>data = [10,9,8,7,6,5,4,3,2,1]</em>

<em>size = len(data)</em>

<em>shellSort(data, size)</em>

<em>print('Sorted Array in Ascending Order:')</em>

<em>print(data)</em>

See more about python at brainly.com/question/18502436

#SPJ1

5 0
2 years ago
Protocols used in each layers in each osi reference model
natka813 [3]

The protocols  that are often used in each layers in each OSI reference model are:

Layers                           Protocols

Layer 7- Application          SMTP, HTTP, FTP, POP3, SNMP

Layer 6- Presentation           MPEG, ASCH, SSL, TLS

Layer 5-Session                   NetBIOS, SAP

Layer 4-Transport                      TCP, UDP

Layer 3-Network                IPV5, IPV6, ICMP, IPSEC, ARP, MPLS.

Layer 2-Data Link       RAPA, PPP, Frame Relay, ATM, Fiber Cable.

Layer 1-Physical              RS232, 100BaseTX, ISDN, 11.

<h3>What is OSI Model?</h3>

The OSI Model is known to be a kind of a logical and conceptual framework that tells all about network communication that is often used by systems in an open to interconnection and also in any communication with other forms of systems.

Note that the Open System Interconnection (OSI Model) is one that tells more about a logical network and it is one that also tells about computer packet transfer via the use of various layers of protocols.

Therefore, The protocols  that are often used in each layers in each OSI reference model are:

Layers                           Protocols

Layer 7- Application          SMTP, HTTP, FTP, POP3, SNMP

Layer 6- Presentation            MPEG, ASCH, SSL, TLS

Layer 5-Session                   NetBIOS, SAP

Layer 4-Transport                      TCP, UDP

Layer 3-Network                IPV5, IPV6, ICMP, IPSEC, ARP, MPLS.

Layer 2-Data Link       RAPA, PPP, Frame Relay, ATM, Fiber Cable.

Layer 1-Physical              RS232, 100BaseTX, ISDN, 11.

Learn more about OSI reference model  from

brainly.com/question/12976859

#SPJ1

8 0
2 years ago
Which piece of code results in the following? Italics
andriy [413]
Italics

Italics

Italics

Italics


7 0
3 years ago
PLEASE GET THE RIGHT ANSWERS AND HELP MEEE
Afina-wow [57]

Answer: #1 is A

Explanation: Parents often monitor what their child is doing online because online activities can be threatening and sometimes dangerous to a child's life, depending on what they come across on the web. just a hunch

4 0
3 years ago
Read 2 more answers
In a typical system design specification, the _____ section describes the constraints, or conditions, affecting a system, includ
Lapatulllka [165]

Answer:

The answer is "Option B".

Explanation:

The system environment includes all software external areas, which may vary from user to user. The System may be different, but it is part of the System environment, depending on the level of available memory. This environment is a part of the System development life cycle. and other options that are not correct which can be described as follows:

  • In option a, Time and cost estimates are part of the SDLC. It is a part where we calculate the overall cost and time for making any new software.
  • In option c, It is not a use in system environment it is reported.
  • In option d, System Components are a hardware device that by system environment for making a system environment but it does not include systems security that's why it is not correct.
6 0
3 years ago
Other questions:
  • The ________ of the operating system enables users to communicate with the computer system. modem window network adapter card us
    14·1 answer
  • How do you add text to a blank slide layout?
    5·2 answers
  • In five to ten sentences, explain what netiquette is and how it improves efficiency and productivity in the workplace.
    10·2 answers
  • The rule of thumb that predicts that the number of transistors on a cpu will double every two years is called ________ law.
    7·1 answer
  • Why might it be a good idea to choose a bus topology?
    6·2 answers
  • In programming, what is a string?
    8·2 answers
  • A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
    5·1 answer
  • What kind of block do you need to check whether a sprite is touching another sprite?
    10·1 answer
  • when a picture is downloaded off the internet and then posted to social media, can the social media platform tell it was downloa
    15·1 answer
  • What are the difference among the whole note, half note and quarter note ? (this is music)
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!