1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
6

Question 24 Multiple Choice Worth 5 points)

Computers and Technology
2 answers:
Veseljchak [2.6K]3 years ago
8 0

Answer:

ZIP

Explanation:

ZIP is a type of compression file as Jpg is a picture file, Gif is a picture file, and ODOC stands for Oklahoma Department of Corrections

TBH:

it may be O ZIP but i've never heard of it.

bekas [8.4K]3 years ago
6 0

Answer:

Zip (D)

Explanation:

Took The Test

You might be interested in
If you schedule a message to be delivered at 6 p.m., but you log out of your computer at 5 p.m., what will happen to the message
valentinak56 [21]

Answer: It will be delivered when you log back in.

Explanation:

It will be delivered when you log back in.

8 0
2 years ago
what is a paragraph on what i can write on what i learned from watching basic keyboard shortcuts using control functions video
finlep [7]

Answer:

Write the following nonsensical paragraph:

Explanation:

I learned how to navigate the computer efficiently. I learned how to use Ctrl + (key) to quickly do (something). ( Now reword that multiple times with different commands. ) Now I can harness my inner laziness to browse the computer at a faster speed.

6 0
4 years ago
You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file an
lesya692 [45]

Answer:

The file system that we shall choose is NTFS file system.

Explanation:

NTFS file system is a file system developed by Microsoft that provides file system encryption. Encryption means to secure our data in such a way such that only authorized person's can have access to it. NTFS file system allows to encrypt data so that all our data is safe from various cyber related thefts thus making our system and data safe from vulnerability of theft.

Encryption does not prevent access to data but the data that is accessed by various agents remains meaningless to all the agents until the user of the data decrypts it.

3 0
4 years ago
What is the name for unwanted software that installs when you click some links?
Rudik [331]
Malware you're welcome 
8 0
4 years ago
Read 2 more answers
What is a zener diode
V125BC [204]

a form of semiconductor diode in which at a critical reverse voltage a large reverse current can flow.
8 0
3 years ago
Other questions:
  • ____ is used specifically for the purpose of recording keystrokes, logging the programs or web sites accessed, or otherwise moni
    8·2 answers
  • What port does the DarkComet malware listen on?
    15·1 answer
  • For which is a chart Legend used
    5·2 answers
  • âthe first line in a hypertext markup language (html) file is the _____, which is a processing instruction indicating the markup
    9·2 answers
  • A __________ is an entity that manages the use, performance, and delivery of cloud services, and negotiates relationships betwee
    6·1 answer
  • An array is stored in contiguous memory locations. You access the individual array value by using the array name followed by the
    6·1 answer
  • _______ view is used to size field names and controls and to apply formats.
    10·2 answers
  • Given three floating-point numbers x, y, and z, output x to the power of z, x to the power of (y to the power of z), the absolut
    12·1 answer
  • What is the alogarithm for solving the perimeter of a triangle
    11·1 answer
  • Which shortcut keys can be used to duplicate a slide?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!