1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sladkih [1.3K]
3 years ago
15

The user documents are stored in _______ format.

Computers and Technology
1 answer:
BartSMP [9]3 years ago
8 0

The user documents are stored in _______ format.

A. qvd.

B.  qvw

C.  None of the options

D.  qvs.

Answer:

B.  qvw

Explanation:

Given the options available, it can be inferred that the application the question is referring to is called QlikView which is a software application that is used for analytics explanation. This software applications saves documents created in a file extension specifically known as "QVW."

Hence, the right answer is that: in QlikView, the user documents are stored in QVW format.

You might be interested in
Plsss help u will get brainliest
liberstina [14]

Answer:

Young-at-Heart having a youthful or fresh spirit not depended of one's age; act in a way like younger person does.

Yare lively; eager; keen; agile; dexterous; ready; prepared.

Explanation:

got those ones hope it helps

4 0
3 years ago
Read 2 more answers
Why would you activate more than one nic on a pc?
natima [27]
For redundancy in case of failure or for connecting them to different subnets. 
4 0
3 years ago
Find a password that "breaks" zxcvbn, i.e. it is probably easy to crack but zxcvbn reports that it has a cracking time of centur
levacccp [35]

Answer:

C0r3CtPP4zzu0Rd

Explanation:

zxcvbn is a password security and "strength" meter. This meter can identify password repetitions and patterns that will make it easier for some of your passwords to be discovered and your account to be hacked. This meter has as easy passwords to be discovered passwords that have dates, popular words or phrases, personal names and etc.

For zxcvbn to consider a password as strong, which would take centuries to be discovered, it is recommended that two words are used. In addition, these words must have a combination of uppercase and lowercase letters, numbers and symbols.

In this case, we can consider that the password "C0r3CtPP4zzu0Rd" is an easy password that could break zxcvbn.

If you pay attention, the password shown above is a code for the words "correct password", however, there is a combination of letters, numbers and symbols that follow a logical sequence and easy to be memorized, however zxcvbn would consider a * that it would take centuries to be discovered.

5 0
2 years ago
How do you uninstall a program using the Control Panel?
adelina 88 [10]

To uninstall a program using the Control Panel, we should Go to the Programs section, click Uninstall or change a program, highlight the program name, then click Uninstall.  To uninstall, right-click the Start button and click Control Panel. Go to Programs, find the program you want to uninstall, click it to select it, and then click Uninstall.

8 0
3 years ago
write a function copy(s, n) that takes as inputs a string s and an integer n, and that uses recursion to create and return a str
Yuri [45]

Answer:

Following are the method to the given question:

def copy(s, n):#defining a method copy that takes two parameters

   if n <= 0:#definig if to compare n value is less than equal to 0

       return ''#return space  

   else:#definig else block  

       return s + copy(s, n-1)#use recursive method that return value

print(copy("by",2))#calling method and print value

print(copy("ta",2))#calling method and print value

print(copy("good by ",2))#calling method and print value

Output:

byby

tata

good by good by

Explanation:

In this code, a method "copy" is declared that takes two parameters that are "s and n" inside the method a conditional statement is used which can be defined as follows.

In the if block is used "n" variable that checks n value which is less than equal to 0 if it is true it will return a space value.

In the else block it use the recursive method that returns a value which is a copy of s that is concatenated together.

8 0
3 years ago
Other questions:
  • What is authentication?
    8·1 answer
  • Expressing your needs to others is aggressive behavior.<br> True or False?
    5·2 answers
  • (In C prog.) What is the difference between scanf, getche and getchar?
    12·1 answer
  • You manage an NLB cluster composed of three servers: Server1, Server2 and Server3. Your maintenance schedule indicates that Serv
    15·1 answer
  • Which of the following statements invokes the GetDiscount function, passing it the contents of two Decimal variables named decSa
    8·1 answer
  • E-mail is an temporary message medium.<br> a. True<br> b. False
    5·2 answers
  • To what would you compare the transport layer?
    14·1 answer
  • #Write a function called is_composite. is_composite should #take as input one integer. It should return True if the #integer is
    11·1 answer
  • What option defines green computing?
    14·1 answer
  • please help me to do this computer homework I beg you all please help me to get the answers please its important please ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!