1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zheka24 [161]
3 years ago
7

Designations at the end of file names such as .docx and .html are called

Computers and Technology
1 answer:
Amanda [17]3 years ago
7 0

Answer:

Designations at the end of file names such as .docx and .html are called. File extensions.

Explanation:

You might be interested in
A cyberbully is someone who invades another person’s privacy by
e-lub [12.9K]
Insulting or harassing them over the Internet
8 0
4 years ago
Read 2 more answers
What is the full form of HTML​
Naya [18.7K]

Answer:

hypertext markup language

3 0
3 years ago
¿como influye la tecnologia en su vida cotidiana?
ANEK [815]

Answer:

La tecnología afecta la forma en que hablamos, aprendemos y pensamos. También nos hemos vuelto dependientes de la tecnología.

Explanation:

3 0
3 years ago
The greater the profit motive in an economic system , the greater the likelihood of a.Innovation b.Equity c.Security d.Governmen
xxMikexx [17]

Answer:

d. Government controlling the factors of production.

Explanation:

Businesses exist to make profit. There is requirement to provide value for money to the customers in order for a business to achieve success. When a business fails to provide good customer service and exists only to make profits they might fail. In such situation government intervenes to stop the monopoly and save the consumers from the mercy of business.

3 0
3 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
Other questions:
  • When operating a computer, a user interacts with
    14·2 answers
  • List five characteristics of a series circuit
    9·1 answer
  • . What are the disadvantages of using small, fixed-length cells in ATM?
    13·2 answers
  • What will be the value of i after the C statements at the right have been executed
    6·1 answer
  • How do you get points without answering questions i need the points for my math D:
    5·2 answers
  • 4. Write an interactive program CountOddDigits that accepts an integer as its inputs and prints the number of even-valued digits
    10·1 answer
  • Which concept often comes in conflict with privacy rights?
    14·1 answer
  • Which of these best represents a call to action?
    7·2 answers
  • Fortnite anyone? real fast ​
    11·2 answers
  • PLEASE HELP
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!