Answer:
1 , 4
Explanation:
A file extension is also known as the file format. The correct option are 1 and 4.
What is a file format?A file extension, often known as a file format, is the structure of a file in terms of how the data within the file is arranged on a computer. A file name extension frequently indicates a certain file format as part of a file's name (suffix).
A file format is chosen on the basis of the following key points,
The need for future accessThe need for digital preservationHence, the correct option are 1 and 4.
Learn more about File Format:
https://brainly.com/question/21435636
#SPJ2
1.
The correct way to use a seat belt is
Answer:
4 steps
Explanation:
Step 1: Pull belt across body
Sit in any of your vehicle's seats and secure the three-point harness in its buckle by pulling it across your body.
If the seatbelt is too short, consider an aftermarket restraint and extender. Make sure they meet federal safety standards and are installed professionally.
Step 2: Adjust lower belt
Adjust the lower belt snuggly across your lap and pelvis area – never your stomach.
Pregnant women should wear the lap belt below their belly, not on or above it.
Step 3: Adjust shoulder belt
Adjust the shoulder belt to fit comfortably across the collarbone and chest. It should never rub on your neck or face. Never put the shoulder belt behind your back or under your arm.
Step 4: Check before driving
Check that the belt is secure before driving.
Answer: across your hips, and across your body over your collar bone
Explanation:
that’s how a seat belt should be worn
Imagine you have borrowed your friend's computer to work on a class project. Checking
the computer out, you notice they've left their web browser open and are signed in to
their email account. Would it be considered a computer crime to read their email, even
though you didn't "hack" their password? What if they had left a text file on their
desktop that included personal information, like their social security number, banking
and credit card information, passwords for sites, etc., but didn't have it password
protected-would accessing that file be a computer crime, even though there was no
password protection on it? Explain your answers
Answer:
Yes.It would be considered as a computer Crime.
Explanation:
This is because you are an unauthorised user
It would be considered a computer crime when one accesses unauthorized information.
What are computer crimes?Computer crimes are also known as cyber crimes. It ranges from accessing information illegally, committing fraud, phishing, identity theft, and so on.
When a user of a computer accesses information that is unauthorized on the computer, such a user has committed a computer crime. It does not matter whether the accessed information is password-protected or otherwise. If it is not stated categorically that such information can be freely accessed, then accessing it is illegal.
More on cyber crimes can be found here: https://brainly.com/question/24182813
#SPJ2
Processor is used to process the data.
A)true
B)False
Answer:
True
Explanation:
If you're talking about CPU (Central processing unit), then you are true. It has no memory at all, all it does is process data. That's why you need RAM and hard drives for memory.
Suzanne Brett wants to borrow $55,000 from the bank. The interest rate is 6.5% and the term is for 5 years.
What is the yearly payment amount?
Answer:
$14575
Explanation:
$550006.5%5 yearsTotal payment amount:
$55000+5*6.5%= $55000 +32.5%= $55000 *1.325= $72875Yearly payment:
$72875/5= $14575Answer:
$3,575
Explanation:
Sushant is a new manager and he wants to share his ideas and working protocol with his team.Compare the advantages and disadvantages of oral and written communication and suggest him which form of communication would be more effective.
Answer:
Advantages of Oral Communication
Use of visual aids like PowerPoint presentation while explaining his ideas and working protocols would help his team to understand him better.There is a spontaneous response from the staff which is more genuine than written response.Disadvantages of Oral Communication
It could prove to be a problem if Sushant has stage fright or is not an effective communicator, which could form an impression of him by the staff.Staff may forget some of Sushant's words as no memory is as reliable as written information.Advantages of Written Communication
A well written memo explains the ideas and working protocols that Sushant wants to relay to the staff.There could be a questionnaire for the staff to give feedback.Aims, objectives are clearly stated.Disadvantages of Written Communication
If the written material is too lengthy, it could be a problem to learn or memorise.It is recommended that Sushant should use written form of communication to convey his ideas and working protocols as it is more effective.
2 reasons why someone might want to alter data on someone else’s computer
Answer:
1. Looking at someone else's files.
2. To hack into the bank's computer and wanting to increase the amount in your account.
I have to make a list of 3 ways to prevent infection of an oPC from a virus. Can somebody help me?
Answer:
Explanation:
dont download random programs, dont turn off windows defender and if you scan your pc weekly