1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arte-miy333 [17]
3 years ago
5

Calling all engineers and tech geniuses. Brianliest for correct answer.

Computers and Technology
1 answer:
vodomira [7]3 years ago
5 0

Answer:

so id assume you need a battery like in the photo. to attach it you should be able to look at the top of the battery and just click the battery component onto the battery. sorry if im using the incorrect terms.

You might be interested in
Can anyone help me out with my photography questions?
Oliga [24]
Verifying, The answer above me is correct
6 0
2 years ago
State 3 file formats explain them in an understanding manner apart from Microsoft word and PDF
natita [175]

Answer:

Hope below explanations are enough.

Explanation:

1. JPEG (or JPG) - Joint Photographic Experts Group

JPEGs might be the most common file type you run across on the web, and more than likely the kind of image that is in your company's MS Word version of its letterhead. JPEGs are known for their "lossy" compression, meaning that the quality of the image decreases as the file size decreases.

You can use JPEGs for projects on the web, in Microsoft Office documents, or for projects that require printing at a high resolution. Paying attention to the resolution and file size with JPEGs is essential in order to produce a nice looking project.

2. PNG - Portable Network Graphics

PNGs are amazing for interactive documents such as web pages, but are not suitable for print. While PNGs are "lossless," meaning you can edit them and not lose quality, they are still low resolution.

The reason PNGs are used in most web projects is that you can save your image with more colors on a transparent background. This makes for a much sharper, web-quality image.

3. GIF - Graphics Interchange Format

GIFs are most common in their animated form, which are all the rage on Tumblr pages and in banner ads. It seems like every other day we have a new Grumpy Cat or Honey Boo Boo animated GIF. In their more basic form, GIFs are formed from up to 256 colors in the RGB colorspace. Due to the limited number of colors, the file size is drastically reduced.

This is a common file type for web projects where an image needs to load very quickly, as opposed to one that needs to retain a higher level of quality.

4. TIFF - Tagged Image File

A TIF is a large raster file that doesn't lose quality. This file type is known for using "lossless compression," meaning the original image data is maintained regardless of how often you might copy, re-save, or compress the original file.

Despite TIFF images' ability to recover their quality after manipulation, you should avoid using this file type on the web -- it can take forever to load. TIFF files are also commonly used when saving photographs for print.

5. PSD - Photoshop Document

PSDs are files that are created and saved in Adobe Photoshop, the most popular graphics editing software ever. This type of file contains "layers" that make modifying the image much easier to handle. This is also the program that generates the raster file types mentioned above.

The largest disadvantage to PSDs is that Photoshop works with raster images as opposed to vector images.

6 0
3 years ago
When discussing the behavior of vulnerability assessments which choice will exploit a weakness?
yKpoI14uk [10]

Answer:

a) Penetration test

Explanation:

A penetration test, often referred to as a pen test, is part of important process in the development of internet facing service. It is a process of determining if vulnerabilities are actually exploitable in a particular environment.

In other words, it is a process that involves a simulated cyber attack against computer system to check for exploitable vulnerabilities or attempts to actively exploit weaknesses in an environment.

Hence, when discussing the behavior of vulnerability assessments the choice that will exploit a weakness is PENETRATION TEST.

5 0
3 years ago
Fields that contain numbers but will not be used for arithmetic operations usually are assigned a data type of memo.
12345 [234]
<span>The statement that fields that contain numbers but will not be used for arithmetic operations usually are assigned a data type of memo is false. 

</span>
7 0
4 years ago
_____ CRM systems are hosted by an external vendor in the vendor's data center.
PtichkaEL [24]

Answer: On- demand

Explanation:

 On demand CRM system are basically hosted by the external vendor in the vendor data center. CRM is basically stand for customer relationship management.

CRM is a strategy that are used for managing the organisation relationship with the customers.

On demand CRM define as software availability for the customers. It basically connected with the idea of software on demand. The software are modify according to the current requirement and demand.

8 0
3 years ago
Other questions:
  • The signal for a turn should be made at least ______ feet before yo wish to make the turn
    8·1 answer
  • Python Question: write a program that generates a random number in the range of 1 through 100, and asks the user to guess what t
    8·1 answer
  • The piston ring isn't a completely solid ring; instead, it's usually split at one point. This split or gap in the ring is called
    7·2 answers
  • Moving read emails to a folder is a great way to stay organized. <br> A) True <br> B) False
    7·2 answers
  • Among the following protocols, terminology or considerations, indicate those that are associated with routing within a single ne
    5·2 answers
  • ______allow you to select elements that are in a certain state, such as when the mouse if hovering over an element
    14·1 answer
  • Which of the statements below are true? Which are false?
    14·1 answer
  • Does speedtest report megabytes per second or megabits
    6·1 answer
  • Data elements in a relational database are organized into ____
    15·1 answer
  • A start-up employs interns. The following details of interns are stored
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!