1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
4 years ago
9

Which file extension does GIMP save a file in (before saving it in a file format that can be used by other programs)?

Computers and Technology
1 answer:
andreev551 [17]4 years ago
8 0
Portable document format
You might be interested in
Which situations are the most likely to use telehealth? Select 3 options.
shutvik [7]

Answer:

Your doctor emails a suggested diet plan.

Your brother was tested for strep throat and now you think you have it.

Your doctor invites you to use the patient portal to view test results.

3 0
3 years ago
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
4 years ago
How does Microsoft word and Power point help the health care Professionals
cestrela7 [59]
They can use the power points to explain therapies and procedures for a " for example" a broken hip, they can use a power point to show what they would do during the surgery, and how the surgery can help  
6 0
4 years ago
The _______ button automatically displays next to the data when you select a range of numeric data, which is an available option
Paul [167]
A. Quick Analysis...
6 0
3 years ago
Read 2 more answers
Sorting data in Excel Online hides content that does not fit your criteria. True False
Katarina [22]

False, sorting doesn't hide them

6 0
4 years ago
Read 2 more answers
Other questions:
  • Edhesive silly questionsj
    8·1 answer
  • When creating databases, the different pieces of information are input into _______.
    7·1 answer
  • Explain one way that wartime advances in such areas as computers
    10·1 answer
  • What are three requirements of information technology a. Accuracyb. _______________________________c. __________________________
    13·1 answer
  • Welcome back to school people!
    15·2 answers
  • Which type of programming language is understood directly by the computer? Assembly language Machine language Visual Basic Java
    13·1 answer
  • What do we call exceptions to the exclusive rights of copyright law?
    14·1 answer
  • A network administrator has asked robin, a network engineer, to use ospf (open shortest path first) along with rip (routing info
    11·1 answer
  • You have been asked to configure a client-side virtualization solution with three guest oss. Each one needs internet access. How
    8·1 answer
  • i installed windows 11 all looks ok except my ebay and some other sites are all white with black text no highlights or color???
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!