1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nata [24]
3 years ago
9

Which of the following filenames is acceptable on both Windows and Mac operating systems?

Computers and Technology
1 answer:
shutvik [7]3 years ago
3 0
BIO-201_Lab_Report
Kksnsnsksmsmbdjsnsnd
You might be interested in
I need help on this, need answer asap.
FinnZ [79.3K]

Answer:

int main() {

int _2dArray[32][32];

for (int i = 0; i < 32; i++) {

 for (int j = 0; j < 32; j++) {

  _2dArray[i][j] = j + i * 32;

 }

}

return 0;

}

Explanation:

Here is a generic C/C++ 2d array traversal and main function example. The rest you'll have to figure out based on what kind of app you're making.

Good luck!

6 0
2 years ago
Encryption that uses 16-character keys is known as ____. strong 128-bit encryption strong 256-bit encryption military-strength 5
allsm [11]

Answer: Strong 128-bit encryption.

Explanation: An individual character corresponds to 8 bits . So if there are 16 characters then,

16\times8=128 bits keys

This makes the 128 bit key encryption the strongest amongst all other options.It is strongest because it is almost impossible to decode the 128-character key  by any method e.g.-brute-force method.

Other options are incorrect because the characters given by the other bits are as follows:  {\frac{256}{8}=32 characters

                         {\frac{512}{8}=64 characters

                         {\frac{512}{8}=128 characters  

Thus, the strongest character key is of 128 bits. for cipher.

3 0
3 years ago
PLEASE HELP 15 POINTS Emma plans on building a dog house using an algorithm. What will be the final step of the process? a) crea
cupoosta [38]

Answer:

Most likely C

Explanation:

Blueprint is the plan so she makes it 1st.

Building the roof is after the deck.

The deck is after the blueprint.

After it's all done she looks at it and thinks about what went wrong at then end.

If there are no mistakes it's B.

Hope this answers your question :).

6 0
3 years ago
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________
tresset_1 [31]
The answer is Phishing
3 0
3 years ago
Read 2 more answers
1. Before operating any power tool, you need to
Anna007 [38]

Answer:

where glasses gloves turn on the power tool

Explanation:

7 0
3 years ago
Other questions:
  • Instructions:Type the correct answer in the box. Spell all words correctly.
    14·2 answers
  • What’s a sign you should talk to an adult about your online time
    14·2 answers
  • Which of the following could be defined as a general-purpose computing device that enables workers to create, manage, store, sea
    12·1 answer
  • Free 35 points!!!
    11·2 answers
  • Define client and.server​
    13·1 answer
  • What is the term used to describe the basic unit of data passed from one computer to another
    14·1 answer
  • Write a summary of five things that you learned about CSS. Do not copy and paste the information. Summarize each point in your o
    5·1 answer
  • Collisions occur when one output is mapped to two inputs. <br><br> A. True <br> B. False
    7·2 answers
  • Choose the missing words in the code below.
    12·1 answer
  • Do anyone know how to code like I need someone do a code for me?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!