1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
2 years ago
8

Why do you want to configure your computer to show you hidden file extensions?

Computers and Technology
1 answer:
adoni [48]2 years ago
5 0
You would want to configure to show file extensions for a couple different reasons. First if you have a couple files and they are have the same name but one is say a PDF while the other is a DOCX file. Another reason, mainly for development, programming, graphic design, ect. you may need to know different extensions to determine the language a file is written in such as PHP, HTML, ect. or to know an image type such as jpg, png, gif, ect.
You might be interested in
To move or copy a range of cells, select the correct order:
Karo-lina-s [1.5K]

Answer:

Correct Order

2. Select the cell or range you want to move or copy.

1. Move the pointer over the border of the selection until the pointer changes shape.

3. To move the range, click the border and drag the selection to a new location, or to copy the range, hold down the Ctrl key and drag the selection to a new location.

Explanation:

To move or copy range of cells in MS Excel, You first select the cell/range you want to move or copy, hover the mouse pointer and take note when it changes shape, then finally click the border (when you noticed the change of shape of the pointer) and hold down the ctrl key and drag it to the destination location.

6 0
2 years ago
Question #1
Evgen [1.6K]

Answer:

Pseudocode and flowchart.

Explanation:

I just got it correct.

8 0
3 years ago
Instructions
marta [7]

Answer:

Explanation:

5 0
3 years ago
A systems analyst attended a week-long workshop on Agile software development. When she returned to her job, she told her boss t
Alexxandr [17]

Answer:

The answer is "disagree"

Explanation:

The system analyst is responsible, who uses research and methods of solving industrial problems with IT. He or she may act as representatives of change that identify, that process improvements needed design systems for such improvements, or inspire us to use systems.

  • Analysts testing and diagnosing issues in operating systems for QA applications and the programmer analyst design and write custom software, that satisfy the requirements of their employers or customers.
  • For the system analysis, the analyst uses all types of techniques, which may be old's, that's why we disagree with the analyst.
5 0
3 years ago
At what point in a vulnerability assessment would an attack tree be utilized?
ella [17]
During threat evaluation - A vulnerability assessment is done to gauge the impact expected from a successful attack and also how vulnerable the software is to an attack. An attack tree, when created during the threat evaluation phase allows one to analyze and describe possible attacks that can be realized on the system.
6 0
3 years ago
Other questions:
  • Research the disadvantages of the computer and explain them.​
    15·1 answer
  • An application programming interface (API) is: Group of answer choices the code the application software needs in order to inter
    9·1 answer
  • Write a static method named anglePairs that accepts three angles (integers), measured in degrees, as parameters and returns whet
    10·1 answer
  • What is SoC? how is it different from CPU?
    14·1 answer
  • When discussing the business requirements of a WLAN design, what is the first question that should be posed
    15·1 answer
  • What is the purpose of a report?
    14·1 answer
  • Hello again, just need help debugging-I honestly have no idea how the "isSpace" etc methods work and I've tried various syntaxes
    13·1 answer
  • Have a great day!
    15·2 answers
  • NEED HELP QUICK!!!
    12·1 answer
  • A user generates printouts consisting of several pages of seemingly random characters every time he prints to a network printer.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!