1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis23 [38]
3 years ago
15

What characters cannot be used in a filename?

Computers and Technology
1 answer:
My name is Ann [436]3 years ago
8 0
I know you cannot use special characters like "?" and ";" I hope you find my answer useful!!! :)
You might be interested in
The _____________ loop allows the receiver to communicate with the sender in the imc process.
postnew [5]
Feedbacks
perhaps !!
<span>The feedback loop allows the receiver to communicate with the sender in the imc process.</span>
4 0
3 years ago
Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and
nikitadnepr [17]

Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users’ needs.Alex been offered

A.Security administrator

Explanation:

  • A security systems administrator handles all aspects of information security and protects the virtual data resources of a company.
  • They are responsible for desktop, mobile, and network security, and are also responsible for installing, administering and troubleshooting an organization's security solutions.
  • A security administrator is the point person for a cybersecurity team.
  • A Security Administrator installs, administers, and troubleshoots an organization's security solutions.
  • The Security Administrator will ensure the network's security, protect against unauthorized access, modification, or destruction, and troubleshoot any access problems

3 0
4 years ago
Notice that the percentages range from just over 55% to just under 65%. This is a range of 10%, so we're going to use 5 evenly-s
vfiekz [6]

Answer:

import numpy as np

l_int = 55/100

h_int = 65/100

hist = np.histogram( paid_tax_preparers_list, bins=5, range=(l_int, h_int))

Explanation:

Numpy is a Python package used to ease mathematical and statistical research calculations. The package creates data structures called arrays that can be used as vector items, making it easy and fast for calculation to be done.

The np.histogram method is used to create or plot histograms of a list or array against the frequency of the items in the array. The bins and the range attributes are used to adjust the display of the histogram, with bins being the number of bin in the graph and range is the given length of the histogram.

7 0
3 years ago
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. Yo
-BARSIC- [3]

Answer:

b. Same SSID, different channel

Explanation:

The Service Set Identifier (SSID) is a sequence that is included in all of the sets in a wirless network and helps identify them as part of the network. Because both points connec to the same network they need the same SSID.

7 0
3 years ago
True / False
artcher [175]

Answer: True

Explanation:

Embedded system processor are more powerful than general purpose processor because the embedded  processors are designed to work in a particular machine for which they get the right amount of RAM and hardware however general purpose processors are to work in every machine which makes them little slow in some machine as they do not get the proper hardware and RAM and have to cope with much more demanding situations.

7 0
4 years ago
Other questions:
  • A computer ____ is the amount of data (measured in bits or bytes) that a cpu can manipulate at one time
    8·1 answer
  • Using the drop-down menus, correctly complete the sentences.
    5·2 answers
  • What effect does the comma style format have on the selected cells?
    13·1 answer
  • In what order does the air flow in a canister vacuum cleaner pass through the following components?
    11·1 answer
  • Master pages are used to create
    7·1 answer
  • Which type of programming language is understood directly by the computer? Assembly language Machine language Visual Basic Java
    13·1 answer
  • What is the job of a router during the process of routing on the Internet?
    10·1 answer
  • Consider a file/directory with the following info:
    14·1 answer
  • Add me on Pokemon go, my trainer code is 5584 3300 5313
    13·1 answer
  • Evaluate how suitable the hardware would be for:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!