1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
3 years ago
14

Jackie created a poster for a rock band. Which file format will best preserve the graphics? 20PTS​

Computers and Technology
2 answers:
Naddik [55]3 years ago
4 0

Answer:

ok  6

Explanation:

becasue

aleksklad [387]3 years ago
4 0

Answer:

EXT. MP3.

Explanation:

You might be interested in
Select all the correct answers.
TEA [102]

Answer:

comlleting novice-level certifications working on one

4 0
3 years ago
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
The average lease payment for a new vehicle is just over $450 per month for a three-year...
hichkok12 [17]

Answer:

it depends on your insurance company

Explanation:

7 0
3 years ago
There are three levels of FDA approval for medical devices, with Level 1 being advanced technological products such as pacemaker
FromTheMoon [43]

<em>The answer is FALSE. </em>

<em>3 Levels of FDA's are: </em>

  • <em>Class 1 - these are devices that contains low risk to the user or patient. Examples: bandages, bedpans, stethoscopes.  </em>
  • <em>Class 2 - devices that has moderate risk to the user such as wheelchairs. </em>
  • <em>Class 3 - devices that implements and support life forms. These can be either inside (implanted) or not. Examples of this are: pacemakers and implants. </em>

<em />

5 0
3 years ago
Identify a syntax used to create a spinner control using an input element. a. b. c. d.
Lorico [155]

Answer:

Option A:

<input name="name" id="id" type="number" value="value" step="value" min="value" max="value" />

Explanation:

Spinner control is a graphical control element where user can adjust the value by pressing up or down arrow button. An example is given in the attached image.

In HTML, one of the key attributes we must use to create a spinner control is "step". The attribute "step" is required to specify the interval of the step value when user press the up or down arrow button.

If we set the attribute values as follows:

  • type = "number"
  • value = 2
  • min = 0
  • max = 10

The setting above will give a spinner control with a range of legal numbers between 0, 2, 4, 6, 8 and 10.

6 0
3 years ago
Other questions:
  • Question 4 (2 points)
    6·2 answers
  • Ethan wants to change the font in his document. He should _____.
    8·2 answers
  • Which of the following STEM discoverers developed a new type of computer hardware?
    11·1 answer
  • Put the following five steps in the order in which you would perform them to use the Paste Special function. 1. Select and copy
    6·1 answer
  • "The _____ of the Open Systems Interconnection (OSI) model generates the receiver’s address and ensures the integrity of message
    6·2 answers
  • What is the WiFi signal strength in different iPhone models?
    7·1 answer
  • What is one reason that writing effective messages is so important
    11·2 answers
  • Write a function:
    13·1 answer
  • Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
    5·1 answer
  • Why is technology bad for you
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!