1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EleoNora [17]
3 years ago
9

What is the main function of a file extension?

Computers and Technology
1 answer:
patriot [66]3 years ago
8 0

To indicate which program is needed to open it

You might be interested in
Hi, please help me complete my Database Development 2 hw by completing what should been done from the document and show the code
PIT_PIT [208]

Answer:

from the document and show the code it used to do it. Need it ASAP before this monday. Tables.sql file need to do this is in the document file. Extra points and brainliest for one who have most correct

5 0
3 years ago
9. These particular machines can be decentralized.
shusha [124]

Answer:

A, B

Explanation:

Because the desktop computer and the printers are decentralized, they're connected with another noce in a company.. So I suppose that the Risograph and photocopier isn't decentralized.

4 0
3 years ago
LAB: Plant information (ArrayList) Given a base Plant class and a derived Flower class, complete main() to create an ArrayList c
sashaice [31]

Answer:

LAB: Plant information (ArrayList) Given a base Plant class and a derived Flower class, complete main() to create an ArrayList called myGarden. The ArrayList should be able to store objects that belong to the Plant class or the Flower class. Create a method called printArrayList), that uses the printinfo methods defined in the respective classes and prints each element in

4 0
3 years ago
Rerouting traffic using arp poisoning is an attack on ________ of a network.
Arada [10]
Rerouting traffic using ARP poisoning is an attack on both the functionality  and confidentiality of a network. This is also known as ARP spoofing. This type of attack takes a legitimate IP address of another host and causes traffic redirection to an infected page. 
5 0
3 years ago
Which of the following describes ETL? a) A process that transforms information using a common set of enterprise definitions b) A
andrezito [222]

Answer:

The correct answer is d) All of these are correct.

Explanation:

ETL stands for Extract, Transform and Load. An ETL system extracts data from the sources, enforces data quality and consistency standards, conforms data so that separated and maybe unrelated sources can be used together, and as a final step delivers data in presentation-ready formats so that developers can build applications and end users can take decisions.

4 0
3 years ago
Other questions:
  • Click _______ to add a new column to a table.
    12·2 answers
  • Which of the following Office Online apps is most effective for creating multi-media presentations
    15·1 answer
  • How much health did a supply drop balloon originally have??
    7·2 answers
  • A microphone, a track ball, and speakers are all examples of ____. hardware software
    6·2 answers
  • What are three ways you cite evedince
    5·2 answers
  • Write a function, sublist, that takes in a list of numbers as the parameter. In the function, use a while loop to return a subli
    13·1 answer
  • Suppose that your application uses a loop that isn't producing the intended results. The best way to analyze what’s going on in
    13·1 answer
  • Which of the following is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct
    15·1 answer
  • List the five parts of a system.describe them.
    13·1 answer
  • Write a program that uses a structure to store the following data about a customer account: Name Address City, State, and ZIP Te
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!