1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
3 years ago
15

URGENT!!! Which file format is used mainly in the Microsoft Windows operating system?

Computers and Technology
2 answers:
ivolga24 [154]3 years ago
8 0
<h2>Answer:</h2>

<u>C. BMP</u> Format is mainly used in Microsoft Operating System.

<h2>Explanation:</h2>
  • GIF format is the Graphic Interchange Format used as an extension for animated raster graphics file and commonly used after JPEG on the World Wide Web. This format is 30 years old.
  • PDF format is the Portable Document Format used for presenting documents, text formatting, images which is independent on software, Operating Systems, and hardware. It is around 20 years old.
  • BMP format is Bitmap Image format is a "raster graphics file" format used in storing bitmap digital images. This is independent on the device and used especially on Microsoft Windows.
  • TIFF format is Tagged Image File Format used for graphic images used by photographers and also in publishing industry. It is released by Aldus 27 years ago. Currently, maintained by Adobe Systems.
  • PNG Format is Portable Network Graphics format is used for animated graphic images which supports data compression. It is released in replacement for Graphics Interchange Format. It supports palette and non-palette images.
Reil [10]3 years ago
5 0

Answer:

BMP

Explanation:

it is used to store bitmap digital images, independently of the display device, especially on Microsoft Windows and OS/2 operating systems.

You might be interested in
"what type of database allows new tables to be created out of information that is requested in a search of the database
Talja [164]
If you don't put propper measures into place while creating this database your site will vulnrable to SQL Injections. In this age most sites aren't because people have learned from past mistakes. My advice do some pentesting when you finish the site and if is vulnrable to SQL Injections quit web devlopment!
3 0
3 years ago
Read 2 more answers
When a new pc is being built which component has the most influence when selecting the case and power supply
PSYCHO15rus [73]

When a new PC is being built the motherboard has the most influence when selecting the case and power supply.

5 0
3 years ago
The IBM system/370 architecture uses a two-level memory structure and refers to the two levels as segments and pages, although t
jek_recluse [69]

Answer:

Explanation:

Introductory thought:  

Thinking about the architecture for the IBM System/370 that is fit for giving higher preparing force and more stockpiling limit since it utilizes two-level of memory structure which is known as the segments and caches and the given plan is as per the following:  

  • In division the address space is isolated into quantities of segments of variable sizes and then again in paging the address space is partitioned into quantities of fixed-sized units that are known as pages.
  • It is more helpful for better utilization of memory.
  • The fundamental architecture for the IBM system/370 architecture the size of the page are for the most part either 2KiloBytes (KB) or 4KB and the size of the segments will be changed from 64KiloBytes to 1MegaBytes.  
  • The two dissimilar kinds of architecture that existed are 370/XA that is the Extended Architecture, also the other is 370/ESA known as the Enterprise Systems Architecture.  
  •  The page size is 4KB for the Extended variant and 1MB for the Enterprise Systems Architecture (ESA).

Advantages of segmentation that the given scheme needs to incorporate includes:

  • In the configuration of the architecture for IBM System/370 the segments are of a fixed size which isn't noticeable for the programmer and as such he will know the interior subtleties and subsequently inside architecture is stowed away from outside gentle.  
  • In IBM system/370 the reference bit is zero for the processor hardware as well as at whatever point another page is stacked into the edge, the reference bit is changed to one after referring to a specific area inside the casing.  
  • The quantity of lines of the page outline table is overseen by the Operating System and a page outline table section is moved to start with one line then onto the next depending on the length of the span of the referenced bit from the page outline which is sets to nothing.
  • Whenever there is a need to supplant the page then the page browsed the line of the longest life non referenced edges.
5 0
3 years ago
It is impossible to adjust "brilliance" in the "light" sub-menu on the iPhone's "Photos" app.
tiny-mole [99]
False. I just tried it to make sure.
7 0
3 years ago
In theory, the use of a software firewall as a replacement for a network appliance can work as long as the host OS's network com
loris [4]

Answer: Virtual firewall

Explanation: Virtual firewall is the firewall system that is implemented on the virtual environment . These maintain the protection of the  network by the filtration of the network traffic.

This firewall is used as the replacement for the network because they have easy cloud to cloud movement.They also maintain the security by disapproving of the risky communications. It is also easy tom maintain and update.

5 0
3 years ago
Other questions:
  • Alcohol is considered a _____ drug
    5·2 answers
  • What process combines data from a list with the content of a document to provide personalized documents?
    11·2 answers
  • In 1988, Robert Morris, Jr. launched a program called the _________ that used weaknesses in e-mail programs and operating system
    5·1 answer
  • According to the stage-gate process developed by Robert G. Cooper, _____ are the results of the previous stage and are the input
    15·1 answer
  • What is the name of a virus written in a macro language and placed within a document or spreadsheet.
    8·2 answers
  • How will you identify a file type on your computer?
    5·1 answer
  • _____ is the practice of using the internet to provide healthcare without going to a doctor’s office or hospital.
    15·2 answers
  • Which of the following statements are true about file naming conventions? Check all of the boxes that apply.
    7·2 answers
  • Quick I need help ASAP
    7·2 answers
  • Which statement is true of both credit cards and debit cards?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!