1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tatiana [17]
3 years ago
5

How will you identify a file type on your computer?

Computers and Technology
1 answer:
Andru [333]3 years ago
5 0

You use the extension on the end of the file to tell you the type of a file

The extension is the .whatever in the name of the file

You might be interested in
Match the following technologies with their applications.
Art [367]

Answer:

how do we answer that question when there is no choices to chose from

Explanation:

3 0
4 years ago
Writing down your main ideas, subpoints, and supporting material, then using geometric shapes and arrows to indicate logical rel
horsena [70]

The process that involves writing down your main ideas, subpoints, and supporting material, then using geometric shapes is mapping.

This includes uses of  arrows to indicate logical relationships.

<h3>What is mapping?</h3>

mapping can be regarded as the prescribed way of assigning an object to each object in one set a particular object.

Learn more about mapping at:

brainly.com/question/25168859

7 0
3 years ago
What is the most commonly used tab in the Filter dialog box?
aleksandrvk [35]

The answer is Messages

3 0
3 years ago
Read 2 more answers
Nadia's productivity at work is being hurt due to the large quantity of unwanted e-mail she receives. What steps can she take to
anastassius [24]

Answer:

Hi,

The best option in the list is <u>stop posting her e-mail address on newsgroups.</u>

Explanation:

Unwanted e-mail is categorized as a spam email.These emails can not be entirely avoided because we use the Internet thus it is recommended that you filter them.A program called my email client can help to filter spam though in some cases, it might not be effective.

The techniques Nadia can employ in this case is to hidden her email address when visiting newsgroups.News groups are forums online where people discuss certain topic.Avoid publishing the email in these web sites can hide her tackle this problem. Additionally, Nadia could train the filter serach feature in her email box through repoting such emails using the report button present, avoid responding/openning spam  or use a third party program to track spam emails and block them.

Wish you Luck!

8 0
3 years ago
Why are medical coders using encoded software
EastWind [94]
To keep the medical records confidential otherwise, hackers would take advantage of them and sell them to the highest bidder 
3 0
3 years ago
Other questions:
  • WILL GIVE BRAINLIEST! A rent payment is an example of which type of expense?
    14·2 answers
  • Compute the bitwise XOR between 10010100 and 11101010.
    12·1 answer
  • What is connectivism and how does it apply to online learning?
    7·1 answer
  • Suppose we provide a new implementation of the transport layer protocol tcp providing the same functionality using different alg
    14·1 answer
  • If K is a foreign key in relation R1, then
    10·1 answer
  • 1. Write a recursive method to determine if a character is in a list of characters in O(logN) time. Mathematically prove (as we
    13·1 answer
  • The minimum spanning tree of an undirected graph G exists if and only if G is connected. True or False?
    12·1 answer
  • The components of hardware include:
    6·2 answers
  • WHATS YALL FAVORITE GAME WHOEVER GIVES THE BEST ANSWER WINS 200
    13·2 answers
  • You are the administrator for the ABC Company. You are looking to install Windows Server 2016, and you need to decide which vers
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!