1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
3 years ago
12

What are the different type of computer files?

Computers and Technology
2 answers:
oee [108]3 years ago
6 0

Answer:

There actually a lot of them: World, PPT, Excell

Explanation:

Lera25 [3.4K]3 years ago
4 0
Oh boy there’s a whole lot.

.jpeg
.html
.docx
.ppt
.odf
.mp4
.mp3

And many many more, I’m not sure how much you need but there’s a few and I can provide more
You might be interested in
Respecting yourself and others, educating yourself and connecting with others, and protecting yourself and others are all aspect
Furkat [3]

Answer:

Digital Citizenship

Explanation: Digital citizenship refers to responsible technology usage, and teaching digital citizenship is essential to helping students achieve and understand digital literacy, as well as ensuring cyberbully prevention, online safety, digital responsibility, and digital health & wellness

5 0
3 years ago
when a stock or bond certificate is delivered, it must be in good transferable form. if the certificate is badly mutilated, it m
Elena-2011 [213]

Authentication can be done by the issuer of the security.

What do you mean by authentication?

Authentication is the act of proving an assertion, such as a computer system user's identification. Authentication is the process of verifying a person's or thing's identity, as opposed to identification, which is the act of indicating that identity. It could entail validating personal identification documents, verifying the authenticity of a website with a digital certificate, carbon dating an artefact, or guaranteeing that a product or document is not counterfeit.

Only a party with access to particular company documents may authenticate a mutilated certificate. It is most likely the issuer, but it could also be the transfer agent or registrar.

To learn more about authentication
brainly.com/question/28240257

#SPJ4

6 0
1 year ago
I am trying to figure out why I keep having the errors on the right side.
Y_Kistochka [10]

Shut down your computer and try again.

6 0
3 years ago
For our computer club in school, we are making a discord server and seeing who can get the most members. I am making an Anime Se
Gwar [14]

Answer:

misteragua#1874

Explanation:

5 0
3 years ago
The programming language that translates digital data into printer commands is known as
jolli1 [7]
The answer is C.) PostScript
8 0
3 years ago
Other questions:
  • When called upon to give an impromptu speech, it is a good idea to do all of the following, except:
    11·2 answers
  • 2. A body is thrown vertically<br>100 m/s Theme taken to retum​
    13·1 answer
  • Please answer this I know that no one else does but I can't think right now
    10·1 answer
  • In python:
    14·1 answer
  • Which of the selections below is not a benefit of imaging the computers on your network? There are fewer licensing fees because
    11·1 answer
  • The _______ of a secondary storage device indicates how much data the storage medium can hold.
    13·1 answer
  • ICS facilitates the ability to communicate by using:
    7·1 answer
  • Router 1 is configured with static NAT. Addressing on the router and the web server are correctly configured, but there is no co
    11·1 answer
  • Technologies can offer safety and protection for people
    11·1 answer
  • The ________ is the biggest power consumer on a mobile computing device. display CPU memory module hard drive
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!