1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sidana [21]
3 years ago
10

What does a file association specify?

Computers and Technology
2 answers:
castortr0y [4]3 years ago
6 0

Answer:

A) the software needed to open a file

Explanation:

Olenka [21]3 years ago
4 0

Answer:

The answer is D

Explanation:

file association associates a file with an application capable of opening that file. More commonly, a file association associates a class of files with a corresponding application.

You might be interested in
Lenny is working as an apprentice to a typesetter. He has been told to sort different font stamps based on their type. Match the
DedPeter [7]

Answer:

Serif without kerning is the first one

Italic is the second one

Bold is the third one

Serif with kerning is the fourth one

Explanation:

I had this question and got this correct

3 0
2 years ago
A restaurant buys a pizza oven that is 4.5 feet long, 5 feet wide and 6 feet tall. What is the volume of the pizza oven?
torisob [31]

Answer:

135 as 4.5 times 5 times 6 gives you the volume and it =135

4 0
3 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Write a function called is_present that takes in two parameters: an integer and a list of integers (NOTE that the first paramete
Agata [3.3K]

Answer:

The function in python is as follows

def is_present(num,list):

    stat = False

    if num in list:

         stat = True

       

    return bool(stat)

Explanation:

This defines the function

def is_present(num,list):

This initializes a boolean variable to false

    stat = False

If the integer number is present in the list

    if num in list:

This boolean variable is updated to true

         stat = True

This returns true or false        

    return bool(stat)

7 0
3 years ago
Write an application that accepts a word from a user and converts it to Pig Latin. If a word starts with a consonant, the Pig La
Reptile [31]

Answer:

Written in Python

word = input("Word: ")

if(word[0]=='a' or word[0]=='e' or word[0]=='i' or word[0] =='o' or word[0]=='u'):

     print(word+"ay")

else:

     a = word[1:]

     print(a+word[0]+"ay")

Explanation:

<em>The program was written in Python and I've added the explanation as an attachment; where I used comments as explanations</em>

Download txt
5 0
3 years ago
Other questions:
  • Define lan wan &amp; man
    14·1 answer
  • What process combines data from a list with the content of a document to provide personalized documents?
    11·2 answers
  • As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendor
    6·1 answer
  • True or false: within a database, fields can be added, deleted and edited but never moved.
    11·1 answer
  • Level of comfort that people feel
    10·1 answer
  • Which is slower RAM or the CPU?
    11·2 answers
  • . Suppose that name is a variable of type string. Write the input statement to read and store the input Brenda Clinton in name
    5·1 answer
  • Describe and compare imperative (C), functional (SML) and logic (Prolog) programming paradigms.
    9·1 answer
  • Cash cows are always in
    7·1 answer
  • A file has TWo parts name them
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!