1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Thepotemich [5.8K]
2 years ago
12

A computer _________________ is a text file that a computer can understand

Computers and Technology
1 answer:
Gekata [30.6K]2 years ago
6 0

Answer:

A computer ___Task__ is a text file that a computer can understand

You might be interested in
Timing can be a major factor in the success of a business incorporation and emerging technology. Describe one potential problem
Serga [27]
The price could go up, it might not work then later down the road
5 0
3 years ago
Read 2 more answers
Ellen is expecting to get a 3% raise next year. She enters .03 in cell D2 so that she can predict her monthly income for the nex
Korolek [52]

Answer: F4

Explanation:

Absolute reference means that we can use a formula for a cell in a Excel and that formula for that particular cell will not be changed even if we copy or drag that formula to some part of the cell.

Excel offers us with the solution of applying formulas to different part of the cells which are indicated by the $ sign. So as in the question Ellen as she is expecting a 3% raise net year in her monthly column, So she can use absolute reference. She enters .03 which is 3 divided by 100 in the monthly income column. So in that column she has to type = for the formula to begin. Then the formula which is .03 and followed by F4 which is used to make the cell D2 absolute reference.

So next time upon referencing cell D2, we would get the value according to the formula.

3 0
3 years ago
What technique is most commonly associated with the use of malicious flash drives by penetration testers
nasty-shy [4]

Answer: Distributing malicious flash drives in a parking lot or other high-traffic area, often with a label that will tempt the person who finds it into plugging it in, is a technique used by penetration testers.

Explanation:

4 0
2 years ago
Explain the principles of computer applications ​
9966 [12]

Answer:

The nature of computers and code, what they can and cannot do.

How computer hardware works: chips, cpu, memory, disk.

Necessary jargon: bits, bytes, megabytes, gigabytes.

How software works: what is a program, what is "running"

How digital images work.

Computer code: loops and logic.

Big ideas: abstraction, logic, bugs.

3 0
2 years ago
⇒PLEASE HELP ME!!!!!!!!∧_∧
saveliy_v [14]
I think it might be Heading & Border
6 0
2 years ago
Read 2 more answers
Other questions:
  • If a storm is 7.5 kilometers away, how much time is expected between observations of lightning and thunder? Round your answer to
    10·1 answer
  • An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo
    11·2 answers
  • Which of the following function headings arevalid? If they are invalid, explain why.
    12·1 answer
  • One gigabyte can be expressed as: a.) 1,000 kilobytes b.) 1,000 bytes c.) 80,000 kilobytes d.) 1,000 megabytes e.) 8,000 bits
    5·1 answer
  • Which of the following is the correct ordering of operating systems, oldest to newest?
    5·2 answers
  • Beth would like to run an nmap scan against all of the systems on her organization's private network. These include systems in t
    15·1 answer
  • Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and
    11·1 answer
  • Gun to yo head any last words??
    10·2 answers
  • CSCU EXAM TEST FINAL1-A software or hardware that checks information coming from the Internet and depending on the applied confi
    6·1 answer
  • SUB2 WWolfPlays on yt <br><br><br> true or false if false ima cri
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!