1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alborosie
3 years ago
14

What does a file extension tell your computer?

Computers and Technology
1 answer:
Dovator [93]3 years ago
3 0
Answer: What type of program to open.
You might be interested in
Which statement describes part of the meeting scheduling process? It is always an all-day event. It is created in a single calen
olga nikolaevna [1]

Answer:

is there a pic or something, sorry i cant help at the time being

Explanation:

5 0
3 years ago
Privacy laws in other countries are an important concern when performing cloud forensics and investigations. You've been assigne
Klio2033 [76]

Answer:

See the explanation for the answer.

Explanation:

Australian regulations makes extremely difficult for the enterprises to move organizations sensitive data to the cloud which is storing outside the Australian network. These are all managed by the Office of Australian Information Commissioner(OAIC) which provides oversight on the data privacy regulations designed to govern the dissemination of the sensitive information.

One rule they applied under this is The Australian National Privacy Act 1988 which tells how the organizations collect, use, secure, store the information. The National Privacy Principles in the Act tells how organizations should use the people's personal information. The NPP has a rule that An organization must take the responsibility to hold the information without misuse or modified by unauthorized access. They require enterprises to put security service level agreements with the cloud service providers that define audit rights, data location, access rights when there is cross border disclosure of information.

In later time they introduced a new principle called The Privacy Amendment Act 2012. This principle gives set of new rules along with the changes in the many rules in the previous act and also this is having a set of new principles those are called Australian Privacy Principles (APP).

In this there is principle for cross border disclosure of personal information which is APP8. This rule regulates the disclosure or transfer of personal information by an agency or company to a different location outside the country.

Before disclosure the information outside they have to take responsible steps that the company outside the Australia must not breach the APP 's.

3 0
3 years ago
Please
Andrew [12]

Answer:

C. 2^16

Explanation:

In Computer Networking, there are five (5) classes of IP addresses, these include;

- Class A

- Class B

- Class C

- Class D

- Class E

The various classes of IP address are represented by the value of their first octet. The first octet value of Class B is 128-191 with a subnet mask of 16.

Hence, from the IP address 149.130.x.y where x and y are 8-bit numbers. The x and y equals 16-bit numbers.

Thus, 2^16 devices can connect to the Wellesley network before we run out of IP addresses.

3 0
3 years ago
What is the output of this program?
Wewaii [24]

Answer:

6 +4 + 6 +4

Explanation:

It will start from index 0 and wherever you find the character inside the indexOf methods then you will note it down.

5 0
4 years ago
Remi always works on several projects at a time. He has thousands of files saved on his computer. Yet he always seems to be able
astraxan [27]

Answer

the micmethod <-----made by myself

Explanation:

1. alphabetical order

2.put in empty folder

3.name folder after file put file in hard drive

4.a hard drive is also a usb

5.make hard drive into necklace and wear all the time

6. now u never lose it

4 0
3 years ago
Other questions:
  • Write the addReview method, which adds a single product review, represented by a ProductReview object, to the ReviewCollector ob
    14·1 answer
  • Creating calendar events prevents individuals from being able to schedule a time to collaborate.
    11·1 answer
  • In which of the following locations can you edit all of the Properties of a PowerPoint file?
    11·1 answer
  • You should structure the<br> first before you search for a relevant picture.
    11·1 answer
  • When a compiler finds errors, it usually indicates what they are so you can correct the code and compile the program again?
    11·1 answer
  • Create an application for a library and name it FineForOverdueBooks. TheMain() method asks the user to input the number of books
    7·1 answer
  • Huffman trees use the _________ of each character to work out their encoding. A) Frequency B) Order in ASCll
    12·1 answer
  • A driving school uses this rule to estimate how many lessons a learner will require.
    9·1 answer
  • How does cryptocurrency exchange software works?
    14·1 answer
  • this bar is located at the top of your computer school in.Its functions allow you to navigate the web​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!