Four common types of files are document files, worksheet files, database files, and presentation files. true or false

Answers

Answer 1
Four common types of files are document files, worksheet files, database files, and presentation files. true or false

Documents *.docx
Worksheets *. xlsx
Database  *.db
Presentation *.pptx

Note all extension ending with x are for current versions of Word, Excel, and Powerpoint, older versions have the same extension less the x on the end.

Answer 2

Four common types of files are document files, worksheet files, database files, and presentation files.

Data are the raw and unprocessed facts like text, numbers, images and sounds. Four common types of files are:

Document files are files generated by word processors like memos, letters, and reports.  Worksheet files: These are files created using electronic spreadsheets to analyze data like budgets and sales income. Database files:  Database management program create database files that contain structured and organized data.Presentation files: These files like audience handouts, speaker notes and electronic slides are generated by presentation graphics programs.

Find out more on files at: https://brainly.com/question/20262915


Related Questions

What does 12/15, or ?12 over 15,” indicate?

Answers

12 point type, 15 point leading

Which of the following is a true statement?

A.Cellular respiration occurs only in plant cells.
B.Cellular respiration occurs only in animal cells.
C.Cellular respiration occurs in both plant and animal cells.
D.Cellular respiration occurs in some plant cells and some animal cell

Answers

Let me help you!
Did you know that both plants and animals undergo cellular respiration? The reason behind that is because both organims needs to get energy and to expel wastes.

Therefore, the correct answer for your question is: C.Cellular respiration occurs in both plant and animal cells.

I hope that helped you! :>

Your network is being flooded by icmp packets. when you trace them down they come from multiple different ip addresses. what kind of attack is this?

Answers

The answer would be DoS attacks. This kind of internet mishap can affect permanent damage on your computer by hacking and installation of trojan viruses.  It also slows down your internet connection because of spam messages being sent from various IP addresses. It

What hull type is best for use on ponds small lakes and calm rivers?

Answers

There are different types of hull, the hull type that is best for use on ponds, small lakes and calm rivers is the FLAT BOTTOM HULL. This is the type usually find in fishing boat, it has a flat spanning and a shallow draft which is very stable in calm weather. 

What is used to read the audio off of a compact disc?

Answers

A CD is read with a laser reflecting off tiny holes burnt into a thin sheet of aluminum.

When you enter search keywords in the search box of file explorer and the onedrive option is selected?

Answers

The search box which is located at the top right corner of the open window is limited to the selected folder but one can expand the search per user. But when the onedrive options is selected the search is automatically expanded to include every folder on the hard drive.

When you enter search keywords in the search box of file explorer and the one drive option is selected, the search will be automatically expanded.

What is file explorer?

File Explorer, formerly known as Windows Explorer, is a file management tool included in Microsoft Windows versions beginning with Windows 95. It offers a graphical user interface for navigating file systems.

The search box in the upper right corner of the open window is limited to the selected folder, however it can be expanded per user. When the one-drive option is chosen, the search is broadened to cover every folder on the hard drive.

Therefore, the Search Tools tab appears when you tap or click inside the search field. As you type in your search phrases, your results will begin to emerge, with your keywords highlighted.

To learn more about file explorer, refer to the link:

https://brainly.com/question/28902151

#SPJ2

A ____ is a collection of computers and devices connected together via communications devices and transmission media.

Answers

The answer to this question is the term network. A network is a collection or group of computers that are joined together, connected, or linked together in order to communicate in exchanging of information and other resources. Computer networks are either wired or wireless an example of network is a local area network or LANs.

which of the following words is an anatomy for cautious

Answers

Uh, I think you mean antonym.

Anyways, here are some antonyms.

Careless, Certain, Foolish, Inattentive, Incautious

The antonym for cautious is reckless (Option A). This is because reckless means acting without care, which is the opposite of being cautious. Other antonyms for cautious include negligent and haphazard.

Understanding Antonyms :

An antonym is a word that has the opposite meaning of another word. In this case, we need to find the antonym for cautious.

Let's examine each option:

Reckless - This means acting without thinking or caring about the consequences, which is the opposite of being cautious.Careful - This means being attentive to avoid danger, which is similar to being cautious.Alert - This means being aware and ready to act, which is not quite the opposite of cautious.Responsible - This means being reliable and trustworthy, which is also not the opposite of cautious.

Therefore, the correct answer is A. Reckless.

Complete Question :

Which one of the following words is an antonym for cautious?

A. Reckless

B. Careful

C. Alert

D. Responsible

Mohammed bought a new smartphone and needs help setting up his contacts. What web resource would be most helpful?

A. Customer service
B. User manual
C. Wikipedia

Answers

B. User manual would be the correct option
B. User manual, they are online and its the best way to find out about your device.

Assume s is a string of lower case characters.

Write a program that prints the number of times the string 'bob' occurs in s. For example, if s = 'azcbobobegghakl', then your program should print

Number of times bob occurs is: 2

Answers

Here's an attempt in C:

#include <string.h>

int CountBob(const char * s)
{
   int n = 0;
   while (s = strstr(s, "bob")) {
      n++; 
      s++;
   }
   return n;
}

int main()
{
   char *s = "azcbobobegghakl";
   int n = CountBob(s);
   printf("Number of times bob occurs is: %d", n);
   getchar();
}


Which layer of the osi model defines services to segment and reassemble data for individual communications between end devices?

Answers

Answer: the Transport Layer

____ errors occur when a formula is written incorrectly, when a mistake is made with a decision condition, or when the wrong variable name is used.

Answers

Based on Understanding Computers: Today and Tomorrow, Comprehensive written by Deborah Morley, Charles S. Parker, This is called run time errors. It appears when a program was incorrectly encoded or the wrong variable is used to implement a task. During this problem, a programmer must learn the cause of the error and correct it to do needed task.

A small, portable monitoring device that makes prolonged electrocardiograph recordings on a portable tape recorder is known as

Answers

It is known as Holter monitoring.

A small, portable monitoring device that makes prolonged electrocardiograph recordings on a portable tape recorder is known as Holter monitoring.

What is Holter monitoring?

A complementary test for determining the existence of cardiac arrhythmias, including bradycardia and tachycardia, is the Holter monitor test. The patient will remain throughout the entire day with a portable monitor, much like with ABPM.

The exam's equipment is fastened to the patient's chest and continuously records the electrical activity of the heart for a whole 24 hours. After 24 hours, the patient's gadget is removed, and the cardiologist receives it to review the recorded activities.

Therefore, Holter monitoring is the use of a small, portable monitoring device to make extensive electrocardiogram recordings on a portable tape recorder.

To learn more about Holter monitoring, refer to the link:

https://brainly.com/question/13551922

#SPJ5

What url tag does adwords add to the destination url using autotagging?

Answers

the URL tag that adwords add to the destination url using autotagging is: gclid=
gclid= is used to determine whether a site is configured to handle query parameter which lets auto-tagging works.
If we don't see gclid= after the site is fully loaded, we can assume that the site isn't using auto tagging

What ntfs permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files?

Answers

You should assign Read & Write permissions only.

You want to set up,your computer so that it attempts to boot from your usb drive before it boots from the internal hard drive where would you configure this

Answers

Go to your BIOS configuration settings, and change the first-priority boot option to USB instead of NTFS.

You might press different buttons when start booting in order to get in the BIOS, like F4 or F5, depends on your PC.

To change the boot priority to a USB drive, access the BIOS/UEFI settings and adjust the boot order. Use the system's startup key to enter the BIOS/UEFI. Invest in SSDs for external storage due to their reliability and speed.

To configure your computer to boot from a USB drive before the internal hard drive, you need to access the system's BIOS or UEFI firmware settings. This is typically done by pressing a key (such as F2, F10, DEL, or ESC) during the startup process, right after you power on the computer. Once in the BIOS/UEFI settings, look for the Boot Order or Boot Priority section. Here, you can change the boot sequence to list the USB drive as the first option. Make sure to save your settings before exiting the BIOS/UEFI. Refer to your computer's manual for specific instructions as the process may vary depending on the motherboard's manufacturer.

When considering the use of external hard drives, especially for data management in remote locations, it is suggested to invest in SSD (Solid State Drive) for their speed and reliability. As for mounting devices on different operating systems, macOS recognizes external devices in /Volumes, and system administrators can configure network drive mounts in large computational infrastructures. This allows users to access their files from various remote computers seamlessly.

Your computer has two basic types of software: system software and ________ software.

Answers

Hi!

Our computers will have system software and application software. Application software would be something like a game or just any general purpose app you've downloaded.

Hopefully, this helps! =)

Your computer has two basic types of software: system software and application software.

What is application software?

Systems software and application software are the two broad categories into which application software can be split. Database software, word processors, web browsers, and spreadsheets are examples of application software, often known as end-user programs.

On the other hand, application software is a sort of software that solely works inside the operating system to carry out a specified purpose. As an illustration, you could use a word processor, a sort of application software, to generate a letter.

System software is the software that controls the overall operation of the computer

Therefore, the second type of software other than system software is application software.

To learn more about application software, refer to the link:

https://brainly.com/question/14125975

#SPJ5

To save a new copy of an existing database, a user can open the original database and select ________ from the file tab.

Answers

Answer:

save as

Explanation:

Final answer:

To create a new copy of an existing database, the user should select 'Save As' from the file tab, allowing them to save the database with a new name or in a different location. For tables, users can download them in Excel by selecting the XLS format.

Explanation:

To save a new copy of an existing database, a user can open the original database and select 'Save As' from the file tab. This allows the user to create a duplicate of the database under a new name or in a new location. The process is essential for backing up data or creating new versions of a database without altering the original file. Typically, in applications such as Microsoft Access or similar database management systems, users have the option to save the entire database or just certain objects like tables or queries. When dealing with tables, a more specific option is available: users can download the table in Excel by selecting the XLS option and then selecting the location to save the file. This helpful for data analysis or reporting purposes outside the database software.

The standard tcp/ip protocol uses ip addresses which are how many bytes in length

Answers

4 bytes. In IPv4, an address has four numbers in the range of 0..255. Each number fits into one byte.

A layer of control in each communicating device that provides functions such as flow control, error detection, and error control is known as a _________ protocol.

Answers

TCP/IP protocol is the answer.

,where can you access email accounts on your windows 7 computer in order to modify current accounts and or create new ones.

Answers

You can access email accounts on your windows 7 computer in order to modify current accounts and or create new ones on Microsoft outlook 2010.
To send and receive the email is the primary function of Microsoft Outlook 2010. it is the part of the Microsoft office suite 2010. Microsoft outlook 2010 is a very useful tool.

Which windows utility should you use to organize the files on your disk to improve efficiency?

Answers

Disk Defragmenter, is a windows utility that rearranges the records and unused space on the PC's hard disk so that the operating system accesses data more rapidly and projects run quicker. Disk Defragmenter keeps running on a timetable, yet you can likewise break down and defragment your disk and drives manually.

____ data exist in a format that does not lend itself to processing that yields information.

Answers

The word that goes in the blank is "unstructured."

Which windows component can be used to display information such as weather forecasts?

Answers

The bottom right widgeti

Which is the best choice
A.
B.
C.
D.

Answers

to find hourly divide total earned by number of hours worked

 so C is the correct answer


In the world of computers, the term ____ refers to the computerâs physical components, such as the monitor, keyboard, motherboard, and hard drive.

Answers

The missing word there is hardware

There are ________ levels of cache memory in the intel i7 processor.

Answers

Answer:

There are 3 levels of cache memory in the intel i7 processor.

Explanation:

   Cache memory is divided into some levels, known as L1, L2, and L3 (L stands for Level). They relate to the proximity of cache to processor execution units. The closer it is to the processor execution unit, the lower its number.

    Thus, the L1 cache is as close as possible. L2 is a little farther and L3 is even farther. Whenever the processor search unit needs new data or instruction, it initially looks in cache L1. If not, go to L2 and then L3. If the information is not at any of the cache levels, it will have to go to RAM.

  A peculiarity about the levels is that L1 is divided into instruction memory and data memory. With this, the processor goes straight to instruction memory if it is looking for an instruction, or goes straight to data memory if it is looking for data. This further speeds up the search processor.

A lifter bucket on top of the valve stem and spring in an OHC engine helps to adjust the A. rocker arms. B. valve clearance. C. lobe rotation. D. timing.

Answers

The lifter bucket, which is on top of the valve stem, and the spring in the Overhead Cam engine aides in adjusting the valve clearance.It is cheaper than replacing the lifter

A(n. ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.

Answers

Digital Signal Processor
A digital signal processor is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.

Internet is a boon or curse

Answers

It really depends on what you're using it for such as looking up a recipe or an answer to a question. If you're using it for illegal purposes or looking up things that are seen as morally wrong by other people it can make the internet seem like a bad thing. But the internet wasn't created with that intended purpose so again it's just your own personal opinion.

Answer:

It can be either.

Explanation:

It depends on your own personal opinion, and experience with the internet.

Other Questions
33.In quadrilateral PQRS, the coordinates are P(0, 0), Q(a + c, 0), R(2a + c, b), and S(a, b). How can you use coordinate geometry to show that the diagonals are perpendicular? Apply the Distance Formula to show that opposite sides to show they are congruent.Find the slopes of their product is 1.Apply the Distance Formula to show that opposite sides to show sides are congruent.Find the slopes and show that their product is -1. Which of the following actions would be most effective in decreasing the amount of carbon dioxide in the atmosphere while increasing the amount of biodiversity in an area? Planting more trees to absorb more of the carbon dioxide from the atmosphere. Converting forests into housing developments to increase the amount of carbon dioxide used. Digging up native prairies so more crops which use more carbon dioxide can be grown. Sowing beans or other legumes along with corn to decrease carbon dioxide fixation. If you have a bac of .10%, you are _______ times more likely to cause an accident than if you were sober Which item is something that almost every society has had? True or false. by the 1900's new york city's second avenue was known as the "the broadway harlem" because so many african american theatres were located there. General Grant responded to the Confederate surrender at Appomattox Court House byfeeding Lees troops and sending them home.arresting Lee and sending his troops home.arresting Lee and sending his troops to prison.executing Lee and arresting his troops. What happens during one half-life of a radioactive isotope? What is the equation of the line in slope-intercept form that is perpendicular to the line y = x 2 and passes through the point (12, 10)? y = x 6 y = x + 6 y = x + 26 y = x + 10 How good nutrition is related to the other components of personal fitness? how has the world curbed countries on nuclear weapons "which water-soluble compound is considered a conditionally essential nutrient for infants" The diameter of a brand of tennis balls is approximately normally distributed, with a mean of 2.63 inches and a standard deviation of 0.03 inch. if you select a random sample of 9 tennis balls, what is the probability that the sample mean is between 2.62 and 2.64 inches The climax of the story occurs whenA.Aileen has her own pup, completing her happiness.B.Aileen leaves her mother to be taken to a new home.C.Aileen is discovered by the little girl as she hides in the garret.D.Aileen saves the baby from the fire in the nursery. A can in the shape of a right cylinder is filled with 10W-40 oil. The weight of 10W-40 oil is 0.857 gram per cubic centimeter. If the cylinder has a radius of length 5 cm and a height of 10 cm, calculate the weight of the oil (in grams) in the can. Round your answer to the nearest tenth. Use 3.14 for pi What new weapon made allied leaders worried about the cost of invading the Japanese mainland? Salina was terrified during the san francisco earthquake of 1989 (who wouldn't be!). for a couple of weeks after, she did not sleep well or feel comfortable inside a building. however, gradually the fears diminished, and they disappeared within a month. her reaction to the earthquake would most likely be diagnosed as a(n): panic attack. phobic reaction. acute stress disorder. posttraumatic stress disorder How can you eliminate the fraction from each side of the equation to make finding thesolution easier?The equation is 1/2(x - 4) = 1/3x + 2 Help with 69 and 70 plzzz if 6a-8b=0 and c=12b, the ratio of a to c is equivalent to the ratio of one to what number? Assignment: Was the Earth Ever Really Flat? Exploration Scientist Date of Theory View of Arrangement of the Universe Ptolemy Copernicus Kepler Galileo Newton Please Help Me, I Need To Turn In My Assignment. I NEED THIS ASAP Steam Workshop Downloader