1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr-060686 [28]
3 years ago
12

Which type of image format is constructed using proportional formulas rather than pixels? This task contains the radio buttons a

nd checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

PNG
B

Vector
C

JPEG
D

Raster
Computers and Technology
2 answers:
castortr0y [4]3 years ago
4 0
I think it would be C. JPEG.
Vlada [557]3 years ago
4 0

Answer:

Png

Explanation:

I took the test

You might be interested in
HELP!!!
jeyben [28]

Answer:

A. a tool tip

Explanation:

6 0
3 years ago
Read 2 more answers
Several users on the second floor of your company's building are reporting that the network is down. You go to the second floor
Juliette [100K]

The troubleshooting step that you should take next is to Question User.

<h3>What is Troubleshooting?</h3>

This refers to the diagnostics that is run on a computer program or system in order to find the problem that is causing it to malfunction or misbehave.

Hence, we can see that based on the fact that several users on the second floor of your company's building are reporting that the network is down and go to the second floor to investigate and find that you are able to access the network, the troubleshooting step that you should take next is to Question User.

Read more about troubleshooting here:

brainly.com/question/13818690

#SPJ1

3 0
2 years ago
PLEASE GET THE RIGHT ANSWERS AND HELP MEEE
Afina-wow [57]

Answer: #1 is A

Explanation: Parents often monitor what their child is doing online because online activities can be threatening and sometimes dangerous to a child's life, depending on what they come across on the web. just a hunch

4 0
3 years ago
Read 2 more answers
Although there are three well-known operating systems, the most common are Microsoft Windows and Mac OS. Discuss the similaritie
tiny-mole [99]

Answer:

There are very few similarities beyond some convergent features of their respective user interfaces. Their internal architecture is very different, differing from kernel models to shell integration to executable formats. A comprehensive list of similarities is neither possible nor useful, because it would consist mostly of obvious statements like "They are both operating systems" or "They both have graphical user interfaces, "They both include

Explanation:

How's that?

7 0
2 years ago
Alice posts a key for encrypting that anyone can access. Bob uses that key to encrypt a message, then sends it to Alice. When Al
UNO [17]

Answer:

Public key encryption

Explanation:

DescriptionPublic-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

5 0
3 years ago
Other questions:
  • 1. Which of the following are considered CAD powerhouses?
    6·1 answer
  • Camera shock might happen if you do which of the following to your camera?
    6·2 answers
  • Vaporization is the process in which liquid is sufficiently cooled to change states of matter from a liquid to a vapor true or f
    8·1 answer
  • In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-p
    15·1 answer
  • Define Indentation
    8·1 answer
  • The definition of network is:
    10·1 answer
  • if you were determining what was expected of you simply by looking at media, what messages would you take away?
    8·2 answers
  • 11) A single inheritance model means: * A) A class can only have one parent class (superclass) B) A class can only have one chil
    7·1 answer
  • For a direct-mapped cache design with a 64-bit address, the following bits of the address are used to access the cache
    7·1 answer
  • One problem with _______ is that often many copies of the same document are made. <br><br>HELPPP ​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!