1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enyata [817]
3 years ago
8

Why do users need to convert files​

Computers and Technology
1 answer:
Stella [2.4K]3 years ago
4 0

If files aren't converted, the certain software won't run properly

You might be interested in
The key to security policy is being able to measure compliance against a set of controls. Security controls define _____ ______
Virty [35]

Answer:

The correct words for the blank spaces are: how; why.

Explanation:

In computer science, security control implies all the efforts of how organizations prevent, detect, and attack risks to safeguard sensitive information. Security policies establish why those actions are taken and set a list of all the assets that must be protected in front of a breach.

8 0
4 years ago
What is abacus main purpose in early days?​
stiv31 [10]
To help count large numbers
7 0
3 years ago
Suppose we perform a sequence of stack operations on a stack whose size never exceeds kk. After every kk operations, we make a c
Ainat [17]

Answer:

The actual cost of  (n) stack operations will be two ( charge for push and pop )

Explanation:

The cost of (n) stack operations involves two charges which are actual cost of operation of the stack which includes charge for pop ( poping an item into the stack) which is one and the charge for push ( pushing an item into the stack ) which is also one. and the charge for copy which is zero. therefore the maximum size of the stack operation can never exceed K because for every k operation there are k units left.

The amortized cost of the stack operation is constant 0 ( 1 ) and the cost of performing an operation on a stack made up of n elements will be assigned as 0 ( n )

7 0
3 years ago
Which is an example of oversharing using GPS?
sergij07 [2.7K]
I believe it is D


Social media networks make it easy to help share what’s going on in your life. The problem is when the wrong people get hold of that information. Criminals are smart. They’re connected, and they know how to use the Internet to their advantage. Stalking a victim, getting to know their routines and the times they’re home (and when they’re not) is as easy as opening a web browser and checking an open account. This excellent infographic from Credit Sesame helps illustrate exactly how your social media info can be misused. Last week, Cult of Mac ran a story that went viral about an app called Girls Around Me which aggregated public profiles of women in an area. Everything from check-ins, status updates, profiles and photo albums were aggregated for app users to see. As a result of the article, Foursquare has since revoked the app’s API access, disabling many of the app’s features. Scary stuff. While the app is hopefully mothballed, it highlighted a lot of security risks that are associated with being on social media. The safest option is to simply not use social media. But I’ll be honest: I can’t imagine deleting my social profile. Luckily, you don’t have to. Being vigilant about safeguarding your profile – and being selective about what you share and who you share it with – can help reduce the risk of using social media.


If you need more info LMK. If this is incorrect please comment that it is, along with the correct answer so I can figure out my error, have a great day TPWK
7 0
3 years ago
Read 2 more answers
What is a Java software​
fiasKO [112]

Answer:Java is a set of computer software and specifications developed by James Gosling at Sun Microsystems, which was later acquired by the Oracle Corporation, that provides a system for developing application software and deploying it in a cross-platform computing environment.

also: 'Java can be used to create complete applications that may run on a single computer or be distributed among servers and clients in a network. It can also be used to build a small application module or applet (a simply designed, small application) for use as part of a Web page.

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Write the function setKthDigit(n, k, d) that takes three integers -- n, k, and d -- where n is a possibly-negative int, k is a n
    9·1 answer
  • When creating an electronic slide presentation, Eliza should ensure that her presentation contains
    6·1 answer
  • Based on your understanding of Moore’s Law, what do you predict will be the next trend in the evolution of computers?
    10·1 answer
  • Declare an array named tax rates of five elements of type double and initialize the elements (starting with the first) to the va
    12·1 answer
  • I need help with writing the code in Python that draws an arrow pointing to the right.
    15·1 answer
  • 2ND LAST QUESTION
    13·1 answer
  • Fortnight on sat 530-10 my name is TTV BTW laggking_12
    5·1 answer
  • Who doesn't like reeses
    11·2 answers
  • Will give 5 star and mark brainleist
    14·1 answer
  • Which of the statements is most likely true about the differences between the basic version and premium version of StreamPal
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!