1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semmy [17]
4 years ago
13

WhAt is a jpeg do i look like i know what a jpeg is

Computers and Technology
1 answer:
Nataly [62]4 years ago
7 0

Answer:

A jpeg is a file format. So you can put files or pictures in jpeg form to send them.

Explanation:

You might be interested in
What at some advantages of creating a powerpoint?
Umnica [9.8K]
 <span>A power point presentation is designed as a presentation tool for any individual that needs to present information in a basic or through the use of a template and/or animated sequences with the flow of information, whether images, [ or text boxes as well as sound if speakers are present; all of which is used to make it more interesting and convey to people. Power point is used for all types of reasons, either for a selling tool such as sales & marketing; academic presentation of certain tasks and pieces of research, et cetera. it can be exported to a PDF or another format to allow further manipulation; it can be saved as a package onto a CD/DVD if you are submitted the presentation by disc. Depending on the version you use, you can customise the way you can present the information itself. Due to the flexibility of the application, if you are for instance using another graphic application to create images and special effects; you can normally drag and drop the content straight into the program without having to import it through the File menu options of Power Point, but again it depends on the version.</span>
8 0
3 years ago
Sftp uses which mechanism to provide security for authentication and data transfer?
12345 [234]

Sftp uses SSH mechanism to provide security for authentication and data transfer.

<h3>What are SSH known for?</h3>

SSH or Secure Shell is known to be a kind of a network communication protocol that helps two computers to be able to communicate and also  share their data.

Therefore, one can say that Sftp uses SSH mechanism to provide security for authentication and data transfer.

Learn more about  SSH mechanism from

brainly.com/question/13086077

#SPJ12

3 0
3 years ago
Does any body know the name of this sensor? ​
kipiarov [429]

Answer:

ummm it looks like a fingerprint sensor

Explanation:

here a similar pic to it .i hope this helps :)

5 0
3 years ago
What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
serg [7]

Answer:

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.

4 0
3 years ago
What is work immersion and its nature​
Kobotan [32]
Work Immersion refers to the subject of the Senior High School Curriculum, which involves hands-on experience or work simulation in which learners can apply their competencies and acquired knowledge relevant to their track.
3 0
3 years ago
Other questions:
  • Mitchell has noticed that his co-workers are unable to open attachments in the emails he sends. What is one possible reason for
    5·1 answer
  • Explain Hayflick limit and why are HeLa cells able to live beyond the Hayflick limit?
    14·1 answer
  • Describe how an attacker can use whois databases and the nslookup tool to perform reconnaissance on an institution before launch
    8·1 answer
  • What will you do to run a presentation from a computer on which you did not prepare the presentation, and how?
    13·1 answer
  • Why do we say that IP provides ""best-effort"" service?
    11·1 answer
  • Suppose you are developing a data visualization application DataViz which calls some functions from a statistics library class S
    5·1 answer
  • Which of the following is not a form of technology?
    15·2 answers
  • 5. Describe the concept behind a digital signature and explain how it relates to cybersecurity by providing a hypothetical examp
    6·1 answer
  • How many total bits are required for a direct-mapped cache with 128 blocks and a block size of 8 bytes, assuming a 4GB main memo
    15·1 answer
  • What are the similarities characteristics between computer and human beings?​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!