1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
3 years ago
12

A file format refers to the background in a presentation. True False

Computers and Technology
1 answer:
morpeh [17]3 years ago
6 0

Answer:

False

Explanation:

Required

Describe file format

Literally, file format means file extension and it describes the type of file.

For instance:

. d o c is a file format of word documents

. j p g is a file format of  images

etc.

<em>Hence, the statement is false</em>

You might be interested in
In the original UNIX operating system, a process executing in kernel mode may not be preempted. Explain why this makes (unmodifi
Elena L [17]

Answer:

the preemption is -> The ability of the operating

system to preempt or stop a currently

scheduled task in favour of a higher priority

task. The scheduling may be one of, but not

limited to, process or 1/0 scheduling etc.

Under Linux, user-space programs have always

been preemptible: the kernel interrupts user

space programs to switch to other threads,

using the regular clock tick. So, the kernel

doesn't wait for user-space programs to

explicitly release the processor (which is the

case in cooperative multitasking). This means

that an infinite loop in an user-space program

cannot block the system.

However, until 2.6 kernels, the kernel itself was

not preemtible: as soon as one thread has

entered the kernel, it could not be preempted to

execute an other thread. However, this absence

of preemption in the kernel caused several

oroblems with regard to latency and scalability.

So, kernel preemption has been introduced in

2.6 kernels, and one can enable or disable it

using the cONFIG_PREEMPT option. If

CONFIG PREEMPT is enabled, then kernel code

can be preempted everywhere, except when the

code has disabled local interrupts. An infinite

loop in the code can no longer block the entire

system. If CONFIG PREEMPT is disabled, then

the 2.4 behaviour is restored.

So it suitable for real time application. Only

difference is we don't see many coders using it

5 0
4 years ago
if you were writing an essay about the major rivers of America which illustration would be the most helpful to your reader ​
Dmitrij [34]

Answer:A map

Explanation: (╹◡╹)

4 0
3 years ago
What is a database in access
aliya0001 [1]
Microsoft Access is a database management system (DBMS) from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools. ... It can also import or link directly to data stored in other applications and databases.
6 0
4 years ago
Computers have small bumps on the keyboards that enable persons to type without looking at the keyboard. These letters are:
QveST [7]

A) FJ is the right answer

3 0
4 years ago
Read 2 more answers
What will happen to the instruction latency as a result of introducing the pipeline? A. The latency will remain unchanged. B. Th
anzhelika [568]

Answer: C.

. The latency will increase from one cycle to 6 cycles as a result of using the pipeline.

Explanation: Pipelines are serially connected sets of instructions where the output of one becomes the input of the next.

Pipelines usually consists of several stages of which the slowest stage is the determines the clock cycle time.

Pipelines usually uses some times to register it clocks

Pipeline clocks are usually routed to separate registers which adds delays to the system.

Clock time is affected by the clock skey( arrival of a sourced clocked at different times within the cycle)signals at and the routing times.

4 0
4 years ago
Other questions:
  • General Hardware Products Your boss, the IT director, wants you to explain FDDs, BPM, DFDs, and UML to a group of company manage
    13·1 answer
  • To find a webpage, the user of a search engine would simply enter a word or phrase in the resource's text box. what is the term
    11·1 answer
  • Where can the Ease of Access and Speech Recognition centers be found?
    8·2 answers
  • Drag each label to the correct location on the image.
    10·1 answer
  • Why would "ExpirationDate” be a poor choice as a primary key?
    11·1 answer
  • Two functions of the UPS​
    8·2 answers
  • What kind of printers tend to have problems with ink drying out inside the nozzles when the printer is not used for a period?
    15·1 answer
  • A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
    6·1 answer
  • computer hardware without software is useless while computer software without hardware is meaningless. explain what do you under
    13·1 answer
  • What classes should I take in high-school for majoring in computer science?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!