1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leto [7]
3 years ago
9

Which of the following should you consider when choosing a file format?

Computers and Technology
2 answers:
Mkey [24]3 years ago
5 0

Answer:

C, the need for future access and digital preservation

Explanation:

On e2020

Vsevolod [243]3 years ago
4 0

Answer:

“The need for future access and digital preservation”

Explanation:

You might be interested in
Which of the following characteristics of an e-mail header should cause suspicion?A. Multiple recipientsB. No subject lineC. Unk
julsineya [31]

Answer:

The correct answer for the given question is option(b) i.e " No subject line"

Explanation:

In the e-mail subject is the important part which describe the information which kind of particular mail is send or received .if we do not give any subject line in the e-mail header then most of the chances that email will not read by recipients due to this suspicion will be caused.

Unknown Sender and Multiple recipients do not cause suspicion so the correct answer is option(b) i.e No subject line".

3 0
3 years ago
Which online resource is usually not free?
Andrej [43]

Answer:

educational tutoring

Explanation:

7 0
3 years ago
Read 2 more answers
A construction-based client would like to develop an application that can analyze an image of machinery and overlay information
Elden [556K]

A form of Extended Reality which can best assist the client with information on the repair is: 3. Augmented Reality.

<h3>What is Extended Reality?</h3>

Extended reality refers to an umbrella terminology that is used to describe all real and virtual physical environments (realities) and human-machine interactions through the use of computer technologies and wearables.

<h3>The forms of Extended Reality.</h3>

In Computer technology, there are four (4) main types of Extended Reality and these include:

  • Mixed Reality
  • Haptic Reality
  • Virtual Reality
  • Augmented Reality

Augmented Reality is mainly applied in maintenance and repair by analyzing an image of machineries and provide information that will assist in the repair process.

Read more on Augmented Reality here: brainly.com/question/9054673

4 0
3 years ago
What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
cestrela7 [59]

<u>Explanation:</u>

Note, a DoS (Denial of Service) attack is <u>different in scope from a DDoS (Distributed Denial of Service) </u>attack. In a DoS attack, the attack on the website's network comes from just a single source (IP address) repeatedly, while in a DDos attack several Ip addresses or sources attack the network of a website.

To trace the source of various types of packets used in a DoS attack (which of less complexity than a DDos attack), a software application like Wireshark could be used to measure trace the packets used in the attack.

4 0
3 years ago
What is a file path?
adoni [48]

Answer:

Similarly, in the computer world, a path defines the location of a file or folder in a computer's file system. Paths are also called "directory paths" because they often include one or more directories that describe the path to the file or folder. A path can either be relative or absolute.

(Brainliest please)

6 0
3 years ago
Other questions:
  • The __________ determines whether coolant should be pumped back into the engine directly or cooled first.
    15·1 answer
  • 20 PTS URGENT!!! Derek’s organization uses an emerging technology that uses specialized software to place an image on an object,
    6·2 answers
  • A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the in
    9·2 answers
  • Create a program that compares the unit prices for two sizes of laundry detergent sold at a grocery store.
    14·1 answer
  • What happens when you get 3 warnings on this site?
    9·2 answers
  • Which of the following is the shortcut key combination for pasting copied text?
    11·2 answers
  • 20. Modifying a report is easiest from what view. O A. Report O B. Layout O C. Print O D. Design
    14·1 answer
  • Consider the code block below. What is the value of amount when this method is called twice, the first time using cookieJar(7) a
    9·1 answer
  • A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
    14·1 answer
  • Name 6 examples of how telemedicine is used in healthcare
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!