1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fudgin [204]
3 years ago
11

When using a file name you have to use only lower case letterstrue or false

Computers and Technology
1 answer:
Llana [10]3 years ago
8 0

true? at least that's what i recall

don't hold me on that

You might be interested in
Choose all items that represent essential features of excellent navigation menu design.
balandron [24]

Answer:

A,B,D,E

Explanation:

4 0
3 years ago
Read 2 more answers
___ is the amount of data that a storage device can move from the storage medium to the computer per second.
Sindrei [870]

Answer:

The answer is "data transfer rate".

Explanation:

The rate of information transfer is the sum of digital information, that travels from one destination to another at a particular time. This can also be viewed as transportation frequency from one place to another one of a given quantity of information. It is the processing power of the larger and specified map, which significantly lowers the data transfer rate.

6 0
4 years ago
Does any body know the name of this sensor? ​
kipiarov [429]

Answer:

ummm it looks like a fingerprint sensor

Explanation:

here a similar pic to it .i hope this helps :)

5 0
3 years ago
Select the correct answer.
miv72 [106K]

Answer: Format

Explanation: My head

3 0
3 years ago
Read 2 more answers
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
4 years ago
Other questions:
  • Write a program named TypingGrades that allows a user to enter a student’s number of words typed. The output is the letter grade
    9·1 answer
  • The mass of a textbook is about 1.25 kilograms. Aproximately, how many ounces is this?
    10·1 answer
  • HELP ASAP!! Ohms law homework
    11·1 answer
  • Karen thinks she should go out with Blane, an unattractive, social misfit, because “If I don’t go out with him, people will thin
    7·1 answer
  • What is the symbol for the relational operator 'equal to'?
    8·1 answer
  • 3. Which one of the following statements is true for spell checkers?
    11·1 answer
  • Write a program that accepts a time as an hour and minute. Add 15 minutes to the time, and output the result. Example 1: Enter t
    11·1 answer
  • Please help me on this I don't know which one they are​
    6·2 answers
  • Why would you browse by entering a URL rather than use a link in a Web page
    15·1 answer
  • What is the database and presentation for files​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!