1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
3 years ago
9

The file format is used for graphic files.

Computers and Technology
1 answer:
Vesna [10]3 years ago
8 0

Answer:

.GIF

Explanation:

GIF or Graphics Interchange Format files are widely used for web graphics, because they are limited to only 256 colors, can allow for transparency, and can be animated. GIF files are typically small is size and are very portable.

You might be interested in
Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept
il63 [147K]
Answer: An evil twin attack poses as a legitimate AP.<span />
7 0
3 years ago
What value will the color variable have after these lines of code run?
hoa [83]

Answer:

red

Explanation:

color is set to red in the last line of being defined.

5 0
3 years ago
What is the 8-bit two's complement form of the decimal number -112? OA. 10001111 OB. 11111000 O C. 10010000 OD. 11111001​
fredd [130]
It’s C because two’s complement are negative values

-128 +16 = -112

Therefore,
C is the appropriate answer
3 0
3 years ago
A DATABASE IS A COLLECTION OF _____ DATA
Bess [88]

Answer:

A database is a collection of organized data.

Explanation:

Hope it will help :)

3 0
4 years ago
Read 2 more answers
Highlight various stages in evolution of computer?​
attashe74 [19]

Answer:

Computing began at the mechanical level, added an information level (software), then a human level and finally a community level; it is an example of general system evolution.

Information: Reduce information overload, clas...

Level: Requirements

Mechanical: Reduce physical heat or force ov...

Community: Reduce community overload, clas...

Explanation:

3 0
2 years ago
Other questions:
  • 3. Megan and her brother Marco have a side business where they shop at flea markets, garage sales, and estate
    9·1 answer
  • Explain briefly why every person in the world is not connected to the Internet.
    9·1 answer
  • A company is executing a strategy to encrypt and sign all proprietary data in transit. The company recently deployed PKI service
    10·1 answer
  • When Tim Berners-Lee developed the first specifications, protocols, and tools for the World Wide Web in 1993, his employers at C
    12·1 answer
  • Given two int variables , firstplacewinner and secondplacewinner, write some code that swaps their values . declare any addition
    11·1 answer
  • Which CIDR network has the smallest possible number of hosts? a. 123.0.0.0/8 b. 123.45.0.0/16 c. 123.45.67.0/24 d. All have the
    10·1 answer
  • How do I start conversations with ppl??? If u answer right I will try send u more points... So please help me
    7·1 answer
  • Question 3
    13·1 answer
  • You've just received an email message that indicates a new serious malicious code threat is spreading across the internet. The m
    10·1 answer
  • When an EC2 instance is being modified to have more RAM, is this considered Scaling Up or Scaling Out?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!