1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
3 years ago
8

What are the two parts of encoding a file?

Computers and Technology
1 answer:
kykrilka [37]3 years ago
8 0

Answer:

its encoding and decoding

Explanation:

because say if were trying to upload a video to a website or edit the video that is called encoding decoding is when someone told you to find a secret message in a game and you solve it by decoding the game files to find the secret message that decoding

hope it helps

You might be interested in
What is an objective of state-sponsored attackers?
Keith_Richards [23]

Answer:

The correct answer is 2. To Spy on citizens

Explanation:

State-sponsored attackers have particular objectives aligned with either the political, commercial or military interests of their country of origin. Investigation shows that “the reality is that if a determined, state-sponsored adversary wants your data, they’re going to get it unless another state-sponsored entity helps you defend it.”

7 0
3 years ago
NullPointerException and ArithmeticException are both derived from which class?
irina1246 [14]

Answer: c) Run-time Exception

Explanation: Runtime Exception is the exception that works in the JVM(Java Virtual Machine) as a super-class. It can also act during the general working of the JVM and are not checked by any resources. The exception that are followed from the Runtime exception is Arithmetic exception and  Null pointer exception as the subclass. Therefore ,the correct option is option(c).

3 0
3 years ago
Sometimes we write similar letters to different people. For example, you might write to your parents to tell them about your cla
OleMash [197]

?

?????????????????????

4 0
3 years ago
Write about virus in five points.​
kvasek [131]
A computer virus is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions. It can self-replicate, inserting itself onto other programs or files, infecting them in the process.
5 0
3 years ago
Which button could Pamela press in the Microsoft Word spell checker to make the word “colour” instantly change to “color” whenev
Savatey [412]
One step is to right click on the word to add it to her personal dictionary. or, <span><span>Press F7. Word starts the spelling and grammar checking utility. </span><span>Make corrections, as appropriate, when prompted.
</span></span>

However, one can create a macro that would do the conversions :

1) Identify a list of words whose spelling you want to convert.2) Turn on the macro recorder. 3) Use the Replace feature to replace the spellings.4) Turn off the macro recorder.

The macro will do a conversion from one to the other. Later, as we have more words that need to be automatically replaced, we can just edit the macro and add those words.

8 0
3 years ago
Other questions:
  • Please help me I just bought a camera and I really wanna shoot in manual mode but I have like the basics down Shutter speed is l
    9·1 answer
  • A retail company assigns a $5000 store bonus if monthly sales are $100,000 or more. Additionally, if their sales exceed 125% or
    5·1 answer
  • Binary code what does this mean I was sick so I don't under stand
    7·2 answers
  • The addElement operation for the linked implementation must determine the parent of the next node to be inserted. Why?
    5·1 answer
  • A word processing program would probably be used to: 
    8·1 answer
  • Dylan, an interior designer, has sketched out a layout for a client's living room. He wants the client's approval of the layout
    11·2 answers
  • Which key is used to indent the first line of a paragraph to the right?
    15·2 answers
  • Write a program that reads from the user any three points in two dimensional space: x1, y1, x2, y2, x3, y3. Assume these points
    13·1 answer
  • Which two components are configured via software in order for a PC to participate in a network environment
    5·1 answer
  • marianne needs to create a version of her slide presentation that does not include all the slides and will be used for a particu
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!