answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna11 [192]
2 years ago
10

Peter accumulated many photos from his visit to Wisconsin. He wants to upload these photos to a social networking site. Which fi

le format is ideal to upload photos to websites?
A)JPEG
B)PDF
C)PSD
D)RAW
Computers and Technology
1 answer:
suter [353]2 years ago
8 0
Answer is A.

Jpeg is one of the most common format for images.

PDF is used for documents generally.

PSD is a Photoshop project.

RAW is a raw file
You might be interested in
Write the definition of a function power_to, which receives two parameters. The first is a float and the second is an integer. T
Ber [7]

Answer:

  1.    public static double power_2(double num1, int num2){
  2.        if(num2<0){
  3.            return 0;
  4.        }
  5.        else{
  6.            double returnedVal = Math.pow(num1,num2);
  7.            return returnedVal;
  8.        }
  9.    }

Explanation:

  • This is implemented in Java programming language
  • Line 1 Is the method declaration which indicates that it will return a floating point number (type double) and accepts two parameters, the first a double and the second an int as required by the question
  • Line 2 Uses and if statement to check if the second parameter is negative (less than 0) and returns 0.0 if this is true
  • Lines 5-7 is the else condition that uses java's Math.pow method to raise the num1 to the power num2 and returns the value
3 0
2 years ago
rite a method so that the main() code below can be replaced by simpler code that calls method calcMilesTraveled(). Original main
weeeeeb [17]

Complete Question

Write a method so that the main() code below can be replaced by the simpler code that calls method calcMiles() traveled.

Original main():

public class Calcmiles {

public static void main(string [] args) {

double milesperhour = 70.0;

double minutestraveled = 100.0;

double hourstraveled;

double milestraveled;

hourstraveled = minutestraveled / 60.0;

milestraveled = hourstraveled * milesperhour;

System.out.println("miles: " + milestraveled); } }

Answer:

import java.util.Scanner;

public class CalcMiles

{

public double CalculateMiles (double miles, double minutes)

{ //Method CalculateMiles defined above

//Declare required variables.

double hours = 0.0;

double mile = 0.0;

//Calculate the hours travelled and miles travelled.

hours = minutes / 60.0;

mile = hours * miles;

//The total miles travelled in return.

return mile;

}

public static void main(String [] args)

{

double milesPerHour = 70.0;

double minsTravelled = 100.0;

CalculateMiles timetraveles = new CalculateMiles();

System.out.println("Miles: " + timetravels.CalculateMiles(milesPerHour, minsTraveled));

}

}

//End of Program

//Program was written in Java

//Comments are used to explain some lines

Read more on Brainly.com - brainly.com/question/9409412#readmore

7 0
2 years ago
Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr
Viktor [21]

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

4 0
2 years ago
In __________ mode, the data within an ip packet is encrypted, but the header information is not.
Anvisha [2.4K]

Answer:

Transport mode

Explanation:

The host-to-host transport mode of internet protocol security (IPsec) is mostly used between two host devices or between a user and a server. When you go online and Google something, what you have done is send a packet request to a server. The IPsec’s transport mode offers secure protection to parts of this IP packet. The packet consists of the original IP header and an IP payload (TCP header and data). In transport mode, only the IP payload is encrypted. The original IP header is not.

6 0
2 years ago
Workspace How do the following technologies help you in your quest to become a digital citizen: kiosks, enterprise computing, na
adelina 88 [10]

Answer:

1) A kiosk are small platforms that can be used for obtaining information and programming relate to entertainment, transportation, commerce, applications, and other areas. A kiosk is located in busy business areas. With Kiosks, one is able to get answers to important information such as service locations.

2) Enterprise computing is the use of information technologies and computing in organizational setting. Enterprise computing provides improved data security

3) Natural language processing is the artificial intelligence concept that deals with the interaction between man and computer by use of natural language. With natural language processing, it is possible to interact with artificial intelligence application in the same manner we interact with a real person

4) Robotics is concerned with the design construction, and operation of robots. It involves the collaboration of computer science and engineering fields. Robotics provide 24 hours assistance including in inhuman conditions such as low oxygen

5) Virtual Reality (VR) is the creation of easily believable simulation of real life by means of computer technology. With virtual reality, one is able to practice practical  trade skills in their living room

Explanation:

6 0
2 years ago
Other questions:
  • Wesley has to create a web banner to announce a “Back to School” sale by an online retailer. Which information should he determi
    15·2 answers
  • An asterisk (*) following a cell reference in a formula is the arithmetic operator that directs excel to perform the division op
    7·1 answer
  • Which behavior could be acceptable at a classical concert as well as at a ball game? standing for an exceptional performance che
    9·2 answers
  • Select the correct answer. Rachel needs to make a presentation on ethics and etiquettes in college. She has about 30 minutes to
    13·1 answer
  • Write multiple if statements: If carYear is before 1968, print "Probably has few safety features." (without quotes). If after 19
    6·1 answer
  • Program documentation _____. Group of answer choices describes the inputs, outputs, and processing logic for all program modules
    6·1 answer
  • For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f
    9·1 answer
  • Of these two types of programs:a. I/O -bound b. CPU -bound which is more likely to have voluntary context switches, and which is
    6·1 answer
  • Which of the following best describes the protocols used on the Internet?
    12·1 answer
  • 2. BIOS is contained in ROM and not in RAM. Can you guess why?​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!