1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kompoz [17]
3 years ago
15

Which of the following characters is acceptable to use in a filename

Computers and Technology
2 answers:
Rama09 [41]3 years ago
4 0
You never stated the possible answer choices to your answer, but usually in a filename you can use all letters of the alphabet, but you cannot use any symbols. such as backslashes, percentage signs etc., but underscores you can use, since they can be used for spacing 2 seperate words.
Diano4ka-milaya [45]3 years ago
4 0

this is a simple answer bud it's the question mark (?)

-S&P

You might be interested in
A(n) ____ uses the communication interface to request resources, and the server responds to these requests.
AlekseyPX
Computer Communication Software
I hope this helps! :)
6 0
4 years ago
How efficient would a 6-bit code be in asynchronous transmission if it had 1 parity bit, 1 start bit, and 2 stop bits?
Lana71 [14]
How efficient well if we are transmitting 6bits and we need 10 to transmit the 6 bits that would be 6/10 = .6 = 60% efficient.
7 0
3 years ago
______is a multimodal application software platform. the centrealized and shared database system ties the entire organization to
m_a_m_a [10]

Answer:

ERP.  

Explanation:

Enterprise Resource Planning Is the software platform for bidirectional applications. The main objective of  ERP it shared the database system and connects the enterprise as a whole so that data can be reached the once and made accessible to all users.

The main advantage of Enterprise Resource Planning is that Enterprise cycle parallelization or optimization it also the boost performance of the organization and saving the time.

3 0
3 years ago
Jacob holds a Computer Hacking Forensic Investigator (CHFI) certification. Which of the following responsibilities should Jacob
nadya68 [22]

Answer:

the answers too the questions are B. identify intruder footprints,

D. Director of security, and B. Nist framework

Explanation:

3 0
2 years ago
Read 2 more answers
An EAP is an:
Oksana_A [137]

i believe the answer would be B

8 0
3 years ago
Read 2 more answers
Other questions:
  • . A register in a computer has a of bits. How many unique combinations can be stored in the register?
    5·1 answer
  • Laura is confused with the spelling of the word pronunciation. She types the word pronunciation. Which feature of the auto corre
    8·2 answers
  • Please Help!!!<br> I keep getting this answer wrong
    10·1 answer
  • Determine if the following statement is true or false:
    5·2 answers
  • What is the cffa act
    5·2 answers
  • Why is it uncommon for users to perform searches directly in database tables?
    15·1 answer
  • Add me on blizzard none of my friends play ow<br> NADERJABER#2530
    8·1 answer
  • What is meant by the term text?
    14·2 answers
  • Who is the first computer programmer​
    14·2 answers
  • Fort Nite is the best u can’t say it’s not
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!