1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
2 years ago
13

Complete the statement by entering the appropriate term in the space below.

Computers and Technology
2 answers:
Vera_Pavlovna [14]2 years ago
7 0

Answer:

Probably "compress", but these days the common answer is "upload to cloud".

Explanation:

Compressing the files is an easy way to reduce their size, unless most of the size is in already compressed, high-entropy formats (like mp3, jpeg or mp4).

The common compression format is .ZIP - you've probably seen it countless times, but other ways like RAR, 7Z are also popular, while Linux users mostly deal with tar.gz, tar.bz2 or tar.xz

On the other hand, the standard practice these days is to upload the presentation to a cloud service, like GSheets or Office PowerPoint 365, which gets rid of the limits of email filesize, while providing a convenient web-app way to view the presentation without downloading (and it doesn't clutter their inbox space or hard drives)! Alternatively, one other way to email any large file (not just a presentation) includes uploading it to some service like DropBox, GDrive or anything similar.

olga2289 [7]2 years ago
4 0

Answer:

zip

Explanation:

Complete the statement by entering the appropriate term in the space below.

When e-mailing a large presentation, it is best to

⇒ zip the file to condense its size.

You might be interested in
Membrane-bound organelles are not found in the cells of A) bacteria. B) fungi. C) plants. Eliminate D) protists.
77julia77 [94]
The answer is A. Bacteria leave a thanks if i am correct please.
7 0
2 years ago
Read 2 more answers
Computer files containing nothing but printable characters are called ____ files.
natali 33 [55]
Computer files containing nothing but printable characters are called text files<span>.</span>
7 0
3 years ago
You want to get an average of the number of siblings people in a group have. Which data format would be best for you to receive?
never [62]

The data format would be best for you to receive is Spreadsheet.

<h3>What is spreadsheet?</h3>

A spreadsheet is a computer program that allows you to compute, organize, analyze, and store data in tabular form. Spreadsheets were created as electronic counterparts to paper accounting spreadsheets. The software runs on data entered into table cells. Each cell can include numeric or text data, as well as the results of formulas that calculate and display a value dependent on the contents of other cells. One such electronic document may also be referred to as a spreadsheet.

Spreadsheet users can change any recorded value and see how it affects calculated numbers. Because of this, the spreadsheet is ideal for "what-if" analysis because many situations may be studied quickly without human recalculation. Modern spreadsheet software can include numerous interacting sheets and display data as text and numbers or as graphics.

To learn more about spreadsheet visit:

brainly.com/question/8284022

#SPJ4

6 0
1 year ago
An organization is planning to implement a VPN. They want to ensure that after a VPN client connects to the VPN server, all traf
Sonja [21]

Answer:

B. Full tunnel.

Explanation:

In this scenario, an organization is planning to implement a virtual private network (VPN). They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. The best method to meet this goal is to use a full tunnel.

A full tunnel is a type of virtual private network that routes and encrypts all traffics or request on a particular network. It is a bidirectional form of encrypting all traffics in a network.

On the other hand, a split tunnel is a type of virtual private network that only encrypts traffic from the internet to the VPN client.

Hence, the full tunnel method is the most secured type of virtual private network.

7 0
2 years ago
The creation of MySpace pages by candidates in the 2008 Presidential Election is an example of the use of ___________________ to
jarptica [38.1K]
This is descriptive of the use of mass media.
7 0
3 years ago
Other questions:
  • PPPLLLLEEEEAAASSSSEEEEE HHELLP me.Does anyone know how to copy an image onto a thing so i can post a real question on brainly. b
    8·2 answers
  • Write a method that checks whether the input string or a sentence (a string with spaces) is a palindrome or not. The method shou
    13·1 answer
  • What information on social networking sites could be used to discriminate against a potential employee
    9·1 answer
  • Need help with just #8
    12·1 answer
  • You are required to design a 4-bit even up-counter using D flip flop by converting combinational circuit to sequential circuit.
    15·1 answer
  • How many hosts are in each subnet?
    15·1 answer
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • In C complete the following:
    12·1 answer
  • Anyone know how to delete that I need ASAP
    13·1 answer
  • (1) Prompt the user for an automobile service. Output the user's input. (1 pt) Ex: Enter desired auto service: Oil change You en
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!