1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
3 years ago
9

Type of file containing instructions that tell your computer how to perform ___

Computers and Technology
1 answer:
julsineya [31]3 years ago
6 0

Answer:

A)File

B)Native

C)Extension

D)File size

Explanation:

You might be interested in
What were the social, political, cultural, or economic context in which the was invention made?
gogolik [260]

Answer:

wait what

Explanation:

7 0
3 years ago
What is the first step that you have to perform before you can add a windows package to a wim file?
TiliK225 [7]
You have to make your encryption is client side.
8 0
3 years ago
You are given n sorted sequences each one containing n keys. You may assume n is a power of two. We want to merge them into one
Galina-37 [17]

Answer:

Upper bound means the algorithm will not use more time than this.

Since there n sorted sequence and having n distinct keys, the upper bound will be :

O(n^2logn) using Min Heap, n^2 because there will be the output of array size n*n

Explanation:

4 0
3 years ago
Find the greatest common factor of 48 and 36.​
gregori [183]

Answer:

Hello, The prime factorization of 48 is: 2 x 2 x 2 x 2 x 3. And The  prime factorization of 36 is: 2 x 2 x 3 x 3.

Explanation:

The prime factors and multiplicities 48 and 36 have in common are: 2 x 2 x 3.

2 x 2 x 3 is the "GCF" of 48 and 36.

"GCF"(48,36) = 12.

7 0
3 years ago
Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or
kupik [55]

Answer:

Windows Defender Using Security Updates and Antivirus Software for Clients

Explanation:

Windows Defender is a software product from Microsoft that is intended to prevent, remove, and quarantine spyware in Microsoft Windows. This program helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer.

7 0
3 years ago
Read 2 more answers
Other questions:
  • There are N bulbs numbered from 1 to N, arranged in a row. The first bulb is plugged into the power socket and each successive b
    6·1 answer
  • What does utp stand for?
    11·2 answers
  • Discuss advantages and disadvantages of Twisted Pair?
    6·1 answer
  • Help me match these answers
    5·1 answer
  • You work as an IT Technician for uCertify Inc. David, a user, has recently purchased a laptop computer. He is now complaining th
    14·1 answer
  • If we can lock a file, we can solve the race condition problem by locking a file during the check-and-use window, because no oth
    14·1 answer
  • . An access specifier is one of three keywords:
    14·1 answer
  • Encrypting text allows us to encrypt and decrypt the text using a special key.
    9·1 answer
  • What tells the hardware what to do and how to do it?
    9·1 answer
  • 1. If an android phone is out of date or outdated and it requires an update. Explain the steps how I can update this phone.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!