1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin2010 [14]
3 years ago
13

What character separates the file extension and the filename?

Computers and Technology
2 answers:
PtichkaEL [24]3 years ago
5 0
A period, Filenamehere.png or .pdf or any other file extension
Natali5045456 [20]3 years ago
4 0
It is a period '.'  like document.docx
You might be interested in
If int a = 4, int *b = &amp;a , int **c= &amp;b;<br> what is the value store in c.
Elenna [48]

Answer:

5.

Explanation:

6 0
3 years ago
Here is the header for a function named computeValue:
zhuklara [117]

Answer:

B) computeValue(10);

Explanation:

Given

Header: void computeValue(int value)

Required

Determine the valid call

To call a function from another function or from the main, the following syntax has to be used.

<em>function-name(parameter-1, parameter-2, parameter-3,.....,parameter-n);</em>

<em />

In the function header given:, the following can be observed:

  • The function name is computeValue
  • It has only one parameter and it is of type integer

So, to call the function; we make use of computeValue(10);

Where 10 represents the value of the parameter (i.e. argument)

7 0
3 years ago
A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing e
balu736 [363]

Answer:

Hybrid

Explanation:

Hybrid cloud is a solution that combines a private cloud with one or more public cloud services, with proprietary software enabling communication between each distinct service.

5 0
3 years ago
A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensiti
jekas [21]

Answer:

the user should disable file and print sharing on the laptop

Explanation:

According to my research on information technology and cyber security, I can say that based on the information provided within the question in order to prevent this the user should disable file and print sharing on the laptop. This is because this file and printer sharing allows users to see your files that you have available as shared and copy or print those files. Which if they are sensitive data you should just disable this option so that people on the same network cannot see or access these files.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
An isp is a group of updates, patches, and fixes that apply to specific oss.
olasank [31]
<span>The statement that an ISP is a group of updates, patches, and fixes that apply to specific OSs is false.
</span> ISP stands for Internet service provider, while OSS stands for Operations support system.<span> The term ISP denotes a company or</span><span> organization that provides services for accessing, using, or participating in the Internet. OSS on the other hand is used by the providers to manage their networks.
</span>
4 0
3 years ago
Other questions:
  • In a word processing program, the ribbon or menus contain the
    12·1 answer
  • Why does someone put 'human' at the end of their social media profile as a summary or description? I've seen this a lot online n
    15·1 answer
  • Throughout the course we have covered a lot of topics in relation to information systems. Select one or two of the major topics
    14·1 answer
  • Dallas is an analyst at an online retailer. He is great at creating representative diagrams showing the relationships between cu
    12·1 answer
  • To more easily incorporate methods into a program, it is common practice to store methods in their own classes and files. Then y
    6·1 answer
  • What is the decrypted binary
    9·1 answer
  • Define the following term. data, database, DBMS, database system, data- base catalog, program-data independence, user wen', DBA,
    12·1 answer
  • Communication protocols, sets of rules agreed to by all parties, are designed in order to:
    15·1 answer
  • Complete the AscendingAndDescending application so that it asks a user to enter three integers. Display them in ascending and de
    7·1 answer
  • After selecting the Slide Master tab (within the View tab), which actions can a user take to configure a slide master?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!