What are .bas, .doc, and .html examples of ?
1) Extensions
2) Domains
3) Database
4) Protocols

1 Answer

Answer :

1) Extensions

Related questions

Description : {.bas , .doc and .htm} are example of ________: a) domains b) protocols c) database d) extensions e) None of The Above

Last Answer : d) extensions

Description : Is there any way, by default, to have iWork save your spreadsheets and documents as .doc and .xls extensions?

Last Answer : You can by changing the default settings, but it is not a good idea. Those extensions are used by the operating system to know what program to use them with. Opening a file with the wrong program can damage files to a point where the files are unreadable by even the origional program.

Description : Market demand for generic domains of cctld extensions in future?

Last Answer : You will probably lose money. And as a web-developer I hate people that do what you want to do and would never give you a dime.

Description : Find out the wrong one from the following: a) HTML 3 was developed in 1995 b) HTML 3.2 was next official version support for Tables, Images, Heading and other elements that is Align attributes etc. ... is current official standard version. d) None of These e) All of the Above f) None of These

Last Answer : f) None of These

Description : How to convert files to ePub from MOBI, DOC, PDF, ODT, HTML and more?

Last Answer : In the burgeoning world of online publication and digital transcription, there is a coinciding bevy of file types and proprietary formats that often require conversion. The ePub file, perhaps one of the ... your e-reading experience. Forget the reading glass, simply turn the text up and have fun!

Description : The document that is used by XSLT to indicate, how to transform the elements of the XML document to another format is (A) HTML page (B) DOC type procedure (C) Style sheet (D) Stored procedure

Last Answer : (C) Style sheet

Description : For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic values. The functional dependency a → c, b → d holds in the following relation (A) In 1NF not in 2NF (B) In 2NF not in 3NF (C) In 3NF (D) In 1NF

Last Answer : (A) In 1NF not in 2NF 

Description : For a database relation R(A,B,C,D) where the domains of A,B,C and D include only atomic values, only the following functional dependencies and those that can be inferred from them are: A→C B→D The ... form but not in third normal form (4) Both in second normal form as well as in third normal form

Last Answer : First normal form but not in second normal form

Description : Developers: Does a database of Mac OS X file extensions exist? Or do you just cross your fingers when choosing and hope nobody else uses it?

Last Answer : answer:At minimum there's always filext.com Seems like it would be useful to know what you might be mistaken for in a windows environment too (especially if you are creating exchangeable document file ... extensions are definitely present, though I'm not sure how comprehensive it is on the Mac side.

Description : The examples of Interior Gateway Protocols (IGP) are. i) Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only

Description : What is Basbar and Bas Kaplar ?

Last Answer : Basbar : Basbar is basically a sheet or color of copper or aluminum. It is the job of the bus driver to deliver power to one or more lads with power from one or more cables. Bus ... is basically a combination of circuit breaker and isolator. There are fire proof walls around the bus coupler.

Description : What is the full form of BAS ?

Last Answer : The full form of BAS is Bangladesh Academy Of Science.

Description : Is BaS molecular or Ionic?

Last Answer : Need answer

Description : Is BaS a ionic or covalent?

Last Answer : Ionic

Description : Is BaS a ionic or covalent?

Last Answer : Ionic

Description : The BAS mild hybrid system used………. To start the internal combustion engine. a. Belt drive b. Chain drive c. Direct drive d. None of the above.

Last Answer : a. Belt drive

Description : Generality is the measure of _____________ a) Ease with which the method can be adapted to different domains of application b) The average time required to construct the target knowledge structures ... unreliable feedback and with a variety of training examples d) The overall power of the system

Last Answer : a) Ease with which the method can be adapted to different domains of application

Description : Which of the following file extension is used for Microsoft Word : a) .doc b) .jpg c) .mp d) None of These

Last Answer : a) .doc

Description : What is the file extension of MS - Word 2003 document: a) Dom b) Txt c) Doc d) None of The Above

Last Answer : c) Doc

Description : What is the default file extension for all Word documents? 1) txt 2) wrd 3) doc 4) none of these

Last Answer : 3) doc

Description : Attorneys can now submit documents electronically in many courts; the standard format in federal courts is ____. a. Microsoft Word (DOC) b. Portable Document Format (PDF) c. Encapsulated Postscript (EPS) d. Postscript (PS)

Last Answer : b. Portable Document Format (PDF)

Description : How can I convert an Excel Macro to html or use the database in a webpage?

Last Answer : answer:Edit the macros and you will see Visual Basic (VB). ASP.NET pages. can use VB (and other languages). One thing about Microsoft technologies - they provide huge amounts of free learning and support. ... if you want to learn ASP.NET For a quick intro, I would check out W3 Schools tutorials.

Description : What do you call the programs that are used to find out possible faults and their causes? A) Operating system extensions B) Cookies C) Diagnostic software D) Boot diskettes

Last Answer : Answer : C

Description : _____and extensions are software that extends or modifies the functionality of another piece of software and require that software be used in order to function: a) Plugs Stan b) Plug outs c) Plugins d) None of These

Last Answer : c) Plugins

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above

Description : Network Architecture refers to the layout of the network consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as ____: a) Wired b) Wireless c) Wired or Wireless d) None of These

Last Answer : c) Wired or Wireless

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : The standard suit of protocols used by the Internet, Intranets, extranets andsome other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : a. Identifying weakness in computer system or networks

Description : Which transport layer protocols is used by DHCP:- a. RSVP b.TCP c. DCCP d. UDP

Last Answer : d. UDP

Description : Port no.(6346,6347) Gnutella service having which protocols ….. a. TCP b. UDP c. TCP, UDP d. NONE

Last Answer : c. TCP, UDP

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : d. Protocols of corrupting data

Description : Which among the following standard protocols is the most widely used by the Internet ? (1) HTTP (2) TCP/IP (3) SMTP (4) SLIP

Last Answer : TCP/IP

Description : Give the name of protocols used by different layers of TCP/IP. Discuss the function of ARP and RARP.

Last Answer : TCP/IP Model contains following layer. 1) Host-to-Network Layer - It defines characteristics of transmission media. It also concern with delivery of data when two systems are attached to same network ... such broadcasts are not forwarded by routers, so a RARP server is needed on each network. 

Description : Explain following protocols: I. PPP II. SLIP

Last Answer : (i)PPP:-PPP means point to point protocol. It is a much more developed protocol than SLIP(which is why it is replacing it).It transfers additional data, better suited to data transmission over the ... character(the END character, the ASCII code of which is 192).A SLIP frame looks like:

Description : Define protocol. Give the name of any two protocols.

Last Answer : Define protocol: There are certain rules that must be followed to ensure proper communication & a set of such rules is known as protocol. Example: UDP, TCP/IP, SMTP, HTTP, SSL, FTP etc

Description : Is there an PDF/doc app or site that can define words?

Last Answer : I just use Google for word definitions.

Description : Are you a Doc Martin fan?

Last Answer : We were quite obsessed with him a couple of years back. We binged our way through all of the seasons back then.

Description : Is anyone else watching Ken Burn's latest doc on Cancer, the Emperor of All Maladies or read the book?

Last Answer : answer:I haven't seen the doc yet and I have not read the book, either. I would definitely be interested in the documentary. Not sure if I have time to read the book. I saw something ... The low dose over a long period helped prevent the cancer cells from metastasizing better than the high dose.

Description : How many pages long in a Word Doc is the average fiction novel?

Last Answer : answer:Well let's see. When I put the novel I just finished in size 12 Times New Roman, it reaches 95 pages. It's about 60,000 words, which is pretty average. A novel technically only has to be ... increase your number of pages by a lot. I would say my novel has a below-average amount of dialogue.

Description : All my original icons on my desktop have turned into Word doc icons with an extension .ink (ex. Safari.Ink) Help!

Last Answer : It has to do with Adobe. You may have to do a system restore. Have you called Apple Help or taken it to the Genius Bar at your nearest Apple Store?

Description : New to Google Docs: will it allow me to save one as a Word doc?

Last Answer : Yes! FILE -> DOWNLOAD AS -> WORD

Description : How to use a photo emailed me in Word doc.

Last Answer : answer:Drag the photo to desktop. Click hold + drag it to desktop

Description : Does a Chinese PhD need to take the GRE or TOEFL exam to do post-doc in the USA or others?

Last Answer : I think it completely depends on what the PhD is in. The ONLY way to find out for sure is to choose some Institutions and apply.

Description : Where I convert my project in .doc format?

Last Answer : I know the Adobe website has some conversion services but I am unsure if they will convert TO a .doc format. You will have to register an account to be able to access their conversion services. i would check, but I am mobile currently

Description : How to edit English image in .doc format in USA?

Last Answer : answer:An English image? Do you mean you have a picture of written English text? Converting a picture of text into editable text is possible, with the right software. I don't know where to find ... exists. It's also imperfect - sometimes it reads words wrong. You'd have to proofread it afterwards.