1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandr82 [10.1K]
3 years ago
7

What is a specific naming convention important in regards to your file management system ?

Computers and Technology
1 answer:
lyudmila [28]3 years ago
5 0
Because it keeps your files, folders, and documents, in consistent logical way.
You might be interested in
Dialogue is not a characteristic of functional text because...
kumpel [21]
It is b,<span>dialogue it's speech between characters, and there are no characters and functional text </span>
4 0
3 years ago
Which Supreme Court case resulted in a decree issued for the Michigan Department of Corrections to provide female inmates access
SOVA2 [1]

Answer:

GLOVER v. JOHNSON December 14th 1999 at Michigan

Explanation:

The court case mentioned above is exactly the court case that has ended with a decree being issued  through the Michigan Department of Corrections for providing female inmates the access to the programming which has previously been allowed only to the male inmates. And this happened in 1999, and some big names were part of the jurisdiction. Its a very popular case definitely.

7 0
3 years ago
Give two examples of non printing characters
VMariaS [17]
Space — each pressing of the key will be displayed as ·
Non-breaking space (°) is a space character that prevents an automatic line break at its position.
3 0
3 years ago
Question 12 (1 point)
QveST [7]

Answer:

margins

Explanation:

the definition margins are the edges

8 0
3 years ago
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Other questions:
  • You have a network of 300 users. You are finding that you must frequently restore files from backup that users have accidentally
    13·1 answer
  • Is spread spectrum transmission done for security reasons in commercial WLANs?
    13·1 answer
  • Given the following sets, for each set operation provide the elements of the resulting set in set notation or using a well-known
    5·1 answer
  • Which of the following languages does not provide built-in-pattern matching operations (the language, although, has pattern matc
    14·1 answer
  • You can apply several different worksheet themes from which tab?
    6·2 answers
  • Identify a characteristic of electronic meeting systems.
    10·1 answer
  • graphic designers can compress files in different formats . One of the formats ensures that the quality and details of the image
    7·1 answer
  • // Exercise 4.16: Mystery.java
    6·1 answer
  • Write a calculate_sq_inches_of_good_pizza function that accepts the diameter of a pizza and returns the area of the pizza minus
    7·1 answer
  • I will give Brainliest and Extra points for correct answers!!!
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!