1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
7

How file can be saved? Explain how a file can be distinguished from other file.​

Computers and Technology
1 answer:
qaws [65]3 years ago
4 0

Do your self ? you are so bad

You might be interested in
The technique helps you explore possible risks by providing access to risk areas identified in the past. It also provides the so
Elza [17]

Answer:

The technique helps you explore possible risks by providing access to risk areas identified in the past is explained below in details.

Explanation:

Risk administration commences with the system of classifying risks. In this method, we examine future developments or circumstances that may influence our understanding and capacity to accomplish our aims. Risk identification incorporates estimating out where, when, how, and why such situations may happen.

7 0
3 years ago
Programs that run on hardware are called:
Novay_Z [31]

Computer programs contain instructions that the hardware

6 0
3 years ago
Can you give me a long list of kid's cartoons
notka56 [123]
Gravity Falls
Adventure Time 
SpongeBob SquarePants,
Cailou 
Bubble Guppies
Dora
Teletubbies
4 0
3 years ago
Read 2 more answers
A(n) ________ converts your voice's sound waves into digital signals.
Montano1993 [528]
Analog-to-digital converter chip
8 0
3 years ago
I need help look at pic
S_A_V [24]

Answer:

ok

Explanation:

where is the pic that u want us to have a look at

8 0
3 years ago
Other questions:
  • The most commonly used software in the school systems that include word processor, spreadsheet, database management system, and
    6·1 answer
  • Write a single statement that will print the message "first is " followed by the value of first, and then a space, followed by "
    6·1 answer
  • This is the formula for the future worth of an investment over time with consistent additional monthly payments and a steady rat
    10·1 answer
  • I. portability II. reusability III. inheritance IV. method V. data A. a new class can automatically pick up data and methods of
    14·1 answer
  • Which concept often comes in conflict with privacy rights?
    14·1 answer
  • Consider the following code: String word [] = {"algorithm", "boolean", "char", "double"}; for ( int i =0; i < word.length/2;
    11·2 answers
  • Of all excavation hazards, _______ poses the greatest risk
    8·1 answer
  • How to tell what wifi your nest camera is connected to
    13·2 answers
  • I don't know what to do, anyone there?​
    13·1 answer
  • 84.6% complete question a network administrator is installing a device that uses redundant array of independent disks (raid) tec
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!