1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
3 years ago
5

Which of the following is NOT a file format used for word processing documents? A. .ppt B. .rtf C. .doc D. .odt

Computers and Technology
1 answer:
ohaa [14]3 years ago
4 0

Answer:

ppt

Explanation:

ppt is a PowerPoint document

Extra Notes:

rtf: Rich Text Format

odt: Open Doc Text

doc: Microsoft Word File (Compatibility File) .docx is newer standard

You might be interested in
When an isolated object becomes charged by induction, which best describes the net charge on the object?
cupoosta [38]
<span>C. The net charge does not change. 

The charge remains neutral and thus, polarization takes effect. Polarization simply means electrons and protons are separated into opposites. To best explain this, we can use a rubber balloon that has been rubbed against animal fur. Assume is has been negatively charged, bring it close to the object and make sure that these two do not touch. Electrons within the object will experience a repulsive force. 
</span>
Since repulsion will be greatest for those electrons nearest the balloon, many of them will be induced into moving away from the rubber balloon. By default, electrons are free to move from atom to atom and thus there will be a mass migration of balloons side of the object to the opposite side of the object. <span>This will leave more atoms on the rubber balloon’s side of the object with a shortage of electrons and will be positively charged and vice versa. </span>Overall, the object will become electrically neutral. 

 
5 0
3 years ago
Slide transition can be defined as ____ of one slide after another​
UkoKoshka [18]

Answer:

visual effect

Explanation:

A slide transition is the visual effect that occurs when you move from one slide to the next during a presentation. You can control the speed, add sound, and customize the look of transition effects.

6 0
3 years ago
What is a multi-user computer? a computer that has a printer connected to it a computer that is able to access the internet a co
Varvara68 [4.7K]
<span>a computer that is used by more than one employee

A multi-tasking computer is </span><span>able to run more than one program</span>
8 0
3 years ago
Hlo plss help.<br>.....,, ​
vladimir1956 [14]

Answer:

please sulto garera kichnu hola

5 0
3 years ago
Read 2 more answers
A technician has installed an IPS appliance on the network. Which of the following is the purpose of that installation?
Scrat [10]

Answer:

B

Explanation:

Stands for "Intrusion Prevention System." An IPS is a network security system designed to prevent malicious activity within a network. It is often used in combination with a network detection system (IDS) and may also be called an intrusion detection and prevention system (IDPS).

Like an IDS, an IPS may include hardware, software, or both. It may also be configured for a network or a single system. However, unlike IDSes, intrusion prevention systems are designed to prevent malicious activity, rather than simply detecting it.

When an IDS detects suspicious activity, such as numerous failed login attempts, it may log the IP address. If it detects a suspicious data transfer, it may check the packets against a database of known viruses to see if any any malicious code is being transferred. When an intrusion detected, an IDS compares the activity to a set of rules designed to prevent malicious activities from taking place. For example, when an IDS detects numerous failed logins, it may block the IP address from accessing any network devices. If it detects a virus, the data may be quarantined or deleted before it reaches its destination.

Examples of hardware-based IPSes include Cisco's IPS 4500 Series, IBM's Security Network "GX" systems, and HP's TippingPoint "NX" devices. Software IPS solutions include Check Point's IPS Software Blade and McAfee's Host Intrusion for Desktop.

-techterms.com

5 0
3 years ago
Other questions:
  • Choose all statements that identify the benefits of programming design.
    10·2 answers
  • You have a group of friends coming to visit you for your high school reunion, and you want to take them out to eat at a local re
    6·1 answer
  • What is the faster way for browsers to obtain the revocation status of a digital certificate attached to a Web site?
    8·1 answer
  • What lets you do many things, like write book reports and stories?
    15·1 answer
  • a ____ is a horizontal or vertical bar that appears when the contents of an area may not be visible completely on the screen.
    15·1 answer
  • relational integrity constraints are rules that enforce basic and fundamental information-based constraints. True or False
    9·1 answer
  • Wanna be friends anyone
    14·2 answers
  • How do I change my username/display name
    12·2 answers
  • WAP to enter a multidigit number and find the sum of only even digits in a number.​
    7·1 answer
  • Which of the following is an example of machine learning?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!