1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
brilliants [131]
3 years ago
14

Give an example of a file suffix for the files created by each of the following: 1) a word processing program 2) a spread sheet

program 3) a presentation program 4) a file compression program. Your answers may be for either OpenOffice or Microsoft Office.
Computers and Technology
1 answer:
gayaneshka [121]3 years ago
7 0
1) .docx
2) .xlsx
3) .pptx
4) .zip
You might be interested in
Which wireless communication is typically limited to six feet of distance?
Anni [7]

Answer:

nfc

Explanation:

8 0
3 years ago
Help 25 points!!!!!!!
Len [333]

Answer:

can u say what the word bank is plz?

Explanation:

3 0
3 years ago
Read 2 more answers
write a function that counts the number of times the value of y occurs in the first n values in array x. y is an integer variabl
mixer [17]

Answer:

Following are the function of count:

void count(int y,int x[],int n) // function definition of count

{

int k,count=0;  // variable declaration

for(k=0;k<n;++k) // iterating over the loop

   {

   if(x[k]==y) //check the conndition number of times the value of y occurs

   {

   count++; // increment of count by 1

   }

   }

Explanation:

Following are the code in c language

#include <stdio.h> // header file  

void count(int y,int x[],int n) // function definition of count

{

int k,count=0;  // variable declaration

for(k=0;k<n;++k) // iterating over the loop

   {

   if(x[k]==y) //check the conndition number of times the value of y occurs

   {

   count++; // increment of count by 1

   }

   }

   printf(" the number of times the value of y occurs :%d",count); // display count value

   }

int main() // main method

{

   int x[100],y,n,k; // variable declarartion

   printf(" Enter the number of terms n :");

   scanf("%d",&n); // input the terms

   printf(" Enter the array x :");

   for(k=0;k<n;++k) // input array x

   {

   scanf("%d",&x[k]);

   }

   printf("Enter the value of y:");

   scanf("%d",&y);// input value y by user

    count(y,x,n); // calling function

   return 0;

}

In the given program we declared an array x ,variable  y and n respectively Input the array x ,y,n  by user after that we call the function count .In the count function we iterate the loop from o position to array length-1 and check the number of times the value of y occurs by using if statement  i.e  if(x[k]==y) if the condition of if block is true then we increment the count variable Otherwise not .Finally display the count variable which describe the number of count.

Output

Enter the number of terms n :5

1

2

2

56

5

Enter the value of y:2

the number of times the value of y occurs :2

Enter the number of terms n :5

1

2

3

56

5

Enter the value of y:26

the number of times the value of y occurs :0

7 0
3 years ago
Does anybody know the answer to 5.7.5: Factorial of Code HS? I can’t figure it out
shutvik [7]

function myFunction(num){

 n = 0;

 total = 1;

 while (n < num){

   total *= (num - n);

   n+=1;

 }

 return total;

}

alert(myFunction(6));

I'm not too proficient in JavaScript but here's what the function would look like. I hope this helps!

4 0
3 years ago
Read 2 more answers
Which domain of an IT infrastructure primarily includes the processes and procedures that end users use to remotely access an or
Natalka [10]

Answer:

The answer is "Remote Domain Access".

Explanation:

It is also known as web access, it is an opportunity to moderately access a desktop or network over a connection to the internet. It also allows you to download the structures, that want even if they are not mentally and emotionally able to communicate specifically.

  • In other words, it uses a satellite for interaction or internet service, and users can access systems remotely.
  • It is also used in the database, that's why it is the correct answer.
6 0
3 years ago
Other questions:
  • Under the Home tab, where can a user find options to change the bullet style of an outline?
    8·1 answer
  • Your friends know that you understand a lot about computers, both the technical details of how they operate as well as informati
    12·1 answer
  • ____ is the use of networking technology to provide medical information and services.
    14·1 answer
  • You are asked to design a system of FP numbers representation (with your own design choices), labeled Custom_FP_48, for which we
    8·1 answer
  • COMPUTER SCIENCE:PIXELS
    5·1 answer
  • Create a 4x5 matrix with ones everywhere and zeros on the last row.
    14·1 answer
  • _____ is a predefined format used for text the can include multiple font formatting features
    13·1 answer
  • The Rule of Thirds is a way to:
    14·1 answer
  • Imagine a typical website that works as a storefront for a business, allowing customers to browse goods online, place orders, re
    13·1 answer
  • Describe the impact of improvement ls in technology and transportation on american citizens. ​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!