1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BARSIC [14]
4 years ago
8

Which of the following statements about computer graphics formats is true?

Computers and Technology
1 answer:
son4ous [18]4 years ago
5 0
The answer about computer graphics formats that is true is b) you may need a utility program to convert graphics to a format compatible with your software.
You might be interested in
What steps can you take to secure your private information?.
pogonyaev

Answer:

Below:

Explanation:

1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.

2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.

3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.

4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.

5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.

6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.

7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.

Hope it helps.......

It's Muska...  

6 0
3 years ago
Elan inserted shapes into a slide in his presentation. What is the quickest way to format those shapes?
Jlenok [28]

Answer:

c. Shape Styles gallery

Explanation: is correct. post protected

4 0
3 years ago
Hard drive access time is measured in
SIZIF [17.4K]

Answer: D) milliseconds

Explanation:

Hard drive access time are measured in milliseconds as, for the personal computer the hard drive access time is about 9 to 15 milliseconds and it basically includes the time taken for the read and write for locate the parts on the disk. As, this is the average time as it depends upon how far the head from desired.

5 0
3 years ago
With a DUI charge on a driver’s record A. the price of his/her insurance greatly increases. B. he/she may drive only during day
Dmitry_Shevchenko [17]
D. Choice 1 and Choice 3 :)
6 0
4 years ago
Read 2 more answers
Why CD-ROM is more reliable than floppy disk?​
irakobra [83]

Answer:

See explanation below.

Explanation:

The CD-ROM is a hard surface. Data is burned into the CD-ROM using a laser. The information in the CD-ROM is pretty stable and usually safe for a long time.

A Floppy Disk is a less hard surface. It is a thin film of magnetic material. Data is stored on the Floppy Disk using a targeted magnetic field. The information can be damaged by getting the disk close to a magnetic source. Even small grains of dust can cause a Floppy Disk to lose data.

This is why a CD-ROM is more reliable than a Floppy Disk.

Hope this helps! Have an Awesome Day!! :-)

3 0
3 years ago
Other questions:
  • Unlike the String class where you must pass a message to an object (instance) of the class, as in x.length( ), in order to use e
    12·1 answer
  • After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready t
    7·1 answer
  • Understanding the context of information allows you to apply it to everyday situations as opposed to just___facts like names,dat
    12·1 answer
  • Write a program that prompts the user for an integer and then prints all prime numbers up to that integer.
    7·1 answer
  • If the individual accessing the system for disaster recovery purposes were not familiar with the IT system and required system a
    5·1 answer
  • Google is an example of a(n):
    13·1 answer
  • What are the characteristics of good blogs?
    8·1 answer
  • Which of these devices collects the most information on network activity?
    11·1 answer
  • To edit the color of the text in Word Online, choose the Font color command under what tab?
    8·1 answer
  • Question 3 (5 points) ✔ Saved Janice is scrolling through her feed one day and notices that Abby said some awful things about Pa
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!