1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tankabanditka [31]
2 years ago
15

Which types of files are saved with the .Mp3 and .Zip extensions? Files are saved with the .Mp3 extension and files are saved wi

th .Zip extension. Reset Next
Computers and Technology
1 answer:
maw [93]2 years ago
6 0

Answer:

Audio files have the ".mp3" file extension and compressed files have the ".zip" file extension.

Explanation:

You might be interested in
According to shared security model, which two are a customer's responsibilities in Oracle Cloud Infrastructure (OCI)?
sashaice [31]

Answer:

According to shared security model, a customer's responsibilities in Oracle Cloud Infrastructure (OCI) are:

1. Workloads security: The customer is responsible for protecting the work function or a distinct capacity, like a Hadoop node, a Web server, a database, or a container, that it puts on the cloud.

2. Services configuration:  The customer is also responsible for securing the specifications that describe the different aspects of its managed service.

Explanation:

Responsibilities are shared between Oracle and the customers using the Oracle Cloud Infrastructure (OCI).  Oracle is solely responsible for the security of the underlying cloud infrastructure (such as data-center facilities, hardware, and software systems), while the customer is responsible for securing the workloads and configuring their services to suit their individual needs.

8 0
3 years ago
ASAP PLZ!!!!!! Select the correct answer from each drop-down menu. Complete the sentences related to the types of sample data. I
Anit [1.1K]

Answer:

Data mining is one of the activities in Data Analysis. ... On the other hand, Data Analysis tests a given hypothesis. While Data mining is based on Mathematical and scientific methods to identify patterns or trends, Data Analysis uses business intelligence and analytics models.

Explanation:

8 0
3 years ago
Which of the following is true of mobile commerce (m-commerce) applications? a. They are supported by short-range wireless commu
KATRIN_1 [288]

Answer:

Option A: They are supported by short-range wireless communication technologies.

Explanation:

M-commerce is a progression of e-commerce which is being used on vast scale now-a-days like in online shopping, online payments etc.

  • As m-commerce applications have facilitated so much, they also support short ranged communication technologies such as Bluetooth which allows the connectivity to internet as well as offers sharing among different devices.
  • m-commerce applications are also compatible with 3G and 4G and even they have been promoted in a remarkable way. As these generations provide much faster speed and better connection, they have added much more to the business.
  • m-commerce applications don't rely on voice recognition or text-to-text speech as they bother not to know who actually is interested. They rather make sure of payment methods to make the payments secure and certain.
  • The m-commerce is totally free from wired protocols as it uses handheld devices including cell phones, tablets or laptops. So that the mobility is ensured.
5 0
3 years ago
Jack needs to create a technical drawing for a new tool.
Delicious77 [7]

Answer:

Jack should send an e-mail out to all of their clients and BCC them on it (so that they don't have each others information) and distribute the information quickly. E-mail is one fastest ways to get information sent to a large amount of people at one time

4 0
3 years ago
Read 2 more answers
Validating the users claimed identity is called which of the following?A. AuthenticationB. IdentificationC. VerificationD. Valid
soldier1979 [14.2K]

Answer:Authentication

Explanation:

3 0
3 years ago
Other questions:
  • How Java provides protection through stack inspection approach ?
    7·1 answer
  • Which type of connection to the Internet is capable of the fastest transfer rates
    14·2 answers
  • The domain name service (dns is a distributed database that allows users to communicate with each other computers by:
    7·1 answer
  • How is kerning used in Word?
    7·2 answers
  • Jamey did a lot of research on his paper topic but can't figure out where to start writing. He has a loose plan in mind, but it'
    9·2 answers
  • What is a disadvantage of shopping online?A.Harder to compare prices than in storesB.A higher risk of financial data theftC.More
    6·2 answers
  • If my usb could unlock my computer with a tool then could i be able to open it using ip unlock
    9·1 answer
  • Something I should look for when trying to decide if a source is credible is the publication's ....
    10·1 answer
  • Xbox one is not turning on and power brick is orange why is that?​
    6·1 answer
  • You have been asked to replace a cracked screen on a laptop. The replacement screen was delivered today, but it did not include
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!