1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
3 years ago
13

Jason works as an accountant in a department store. He needs to keep a daily record of all the invoices issued by the store. Whi

ch file naming convention would help him the most?
A.
give the files a unique name
B.
name the files in YYMMDD format
C.
use descriptive names while naming the files
D.
use capital letters while naming the files
Computers and Technology
2 answers:
umka2103 [35]3 years ago
7 0
C so he won’t get confused on what
pochemuha3 years ago
5 0
Give the files the exact date as a name
You might be interested in
Choose the term to complete the sentence.
netineya [11]

Answer:

raster

Explanation:

-> A <u>raster</u> image consists of a grid of colored pixels.

To choose our answer we can look at the definition for each of the options:

[✘] wireframe - "a skeletal three-dimensional model in which only lines and vertices are represented"

[✘] vector - "denoting a type of graphical representation using straight lines to construct the outlines of objects"

[✔] raster - "a rectangular pattern of parallel scanning lines followed by the electron beam on a television screen or computer monitor'

[✘] rendering - "the processing of an outline image using color and shading to make it appear solid and three-dimensional"

<em>(All definitions are quoted from Oxford Languages)</em>

-> Based on these definitions, raster makes the most sense

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

4 0
3 years ago
What is an analog computer?<br>​
tigry1 [53]

Answer:

It is a computer that is used to process analog data.

7 0
3 years ago
Read 2 more answers
____________ occurs when a provider does not support data export or when a provider's service is unavailable through others.
elixir [45]

Answer:

The correct answer to the following question will be Vendor Lock-In.

Explanation:

Vendor Lock-In: It is also known as Customer Lock-In. The Vendor Lock-In makes the costumer depends on services and products on the vendor. The costumers are not able to use another vendor without changing costs as it creates barriers.

Some ways to avoid Vendor Lock-In, these are as follows:

  • Design your application portable.
  • Keep watching vendor contracts.
  • Arrange both entry and exit with your vendor.

8 0
3 years ago
Describe the difference between the while loop and the do-while loop.
Karo-lina-s [1.5K]

Answer:

The difference between While loop and Do - While loop are explained below.

Explanation:

  • While loop : It is a looping procedure in which the statements inside the while loop are executed depending on the condition outside the while before starting the loop.
  • If the condition is true then the code inside loop is executed otherwise not.
  • Do - While loop:  It is a looping procedure in which the statements inside the loop get executed and then the condition at the end of the loop is checked.
  • This means even the condition is fails the statements inside the loop are executed once.
  • Do while loop name itself suggests that "do the while and then check the condition".  
7 0
3 years ago
The _______ "represents a set of features that enables the user to inform himself whether a security feature is in operation or
quester [9]

Answer:

Visibility and configuration of security.

Explanation:

The visibility and configuration of security represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.

4 0
3 years ago
Other questions:
  • Computer hardware had been designed to run a single operating system and a single app, leaving computers vastly underutilized. o
    15·1 answer
  • Which of the following characteristics relates to authentication header (AH)? It is a document that defines or describes compute
    11·1 answer
  • What is an activity that can help you enhance the appearance of your computer’s desktop?
    12·2 answers
  • Home communication involves controlling systems such as heating, cooling, and security.
    11·1 answer
  • What are 2 ways that technology can negatively impact the environment.
    8·2 answers
  • What are the basic tools for coding HTML manually?
    10·2 answers
  • A network monitor records the following information while recording a network connection.
    9·1 answer
  • Security Definition updates for windows defender are performed through the ——— function in windows server 2016
    7·2 answers
  • Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current
    14·1 answer
  • A Development team begins work on a new software application and decides to involve the client’s IT experts to ensure that secur
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!