1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Musya8 [376]
3 years ago
11

PLZZZZZ help will give brainleist Two common sound files are?

Computers and Technology
1 answer:
Vinil7 [7]3 years ago
8 0

Answer:

MP3/WAV

Explanation

Leanred this on a test! in COMPUER WEB!:)

You might be interested in
In a paragraph discuss 5 steps of saving a document in a storage device.<br>​
zubka84 [21]
<h2>The five steps of saving a document in a storage device are firstly, click File. Secondly, click Save As.</h2><h2> In addition, click Computer. Moreover, double click the storage device and type file name. Lastly, click Save or Enter.</h2>
6 0
2 years ago
What does AU stand for in computer?
SpyIntel [72]

Answer:

AU stands for <em>Audio Units.</em>

7 0
3 years ago
Why do reviewers consider the context of a work?
iVinArrow [24]

Answer:

I think the answer is C.

Explanation:

7 0
3 years ago
Which activity might be a job or task of an IT worker who manages work
lapo4ka [179]

Answer: Sets up a LAN for the office

Explanation:

The activity that might be a job or task of an IT worker who manages work is the setting up of a local area network for the office.

Through the setting up of the local area network, the computers in the company can be interconnected together within the organization.

6 0
3 years ago
. Linux servers are typically stored in a locked server closet to prevent physical access by unauthorized persons. Describe why
IrinaVladis [17]

Answer:

Following are the solution to this question:

Explanation:

Physical Access to Linux Servers:

Unauthorized staff is denied access to windows server due to various reasonable factors which might damage databases and then all database depends.

Linux distributions handle their servers but it is almost important that they will be protected or hackproof to safeguards their organizations' networks.

Guess if an unwanted staff has access to the server, he/she can be using the device by just placing a simple USB or dragging the information of the database to study it even further. Here that the results stay throughout the possession of even an unauthorized person, whom no organization wants to confront.

Its attacker may also damage that server by installing a virus or any virus mostly on the server. User security can allow unauthorized staff to go on a search and retrieve the database to disc inside the database.

Warranted physical limitations:

All such physical constraints are assured because the company cannot manage a minor error in physical security.

Because conflicts with both the physical limitation will damage its database so much but leave all loopholes free to that same protection of attackers and operators.

Its physical safety guarantee should be maintained by routine server room checks and ensure that every step of safety is undertaken and results are achieved.

6 0
3 years ago
Other questions:
  • For home service calls, the ideal soldering tool is a(n) A. alcohol torch. B. soldering gun. C. gas torch. D. soldering iron.
    15·1 answer
  • How do I change my keyboard's debounce time?
    15·2 answers
  • What are some ways to change column width? Check all that apply.
    13·2 answers
  • What two methods can be used to access and modify an existing program that is running on an iot device in cisco packet tracer? (
    6·1 answer
  • A predictive data analyst ___
    11·1 answer
  • How to find out what version of windows i have?
    13·1 answer
  • Which font attribute allows you to change the text from bold to
    10·2 answers
  • Dates of birth were entered into a computer program . The data was stored in the format DAY/MONTH/YEAR.The program rejected this
    12·1 answer
  • D. A cell style can consist of
    14·2 answers
  • How does communication produce clarity and direction​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!