1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis23 [38]
3 years ago
15

What characters cannot be used in a filename?

Computers and Technology
1 answer:
My name is Ann [436]3 years ago
8 0
I know you cannot use special characters like "?" and ";" I hope you find my answer useful!!! :)
You might be interested in
Which page feature is used in long documents to assist readers in quickly finding information in the document without having to
irakobra [83]

Maybe it is Ctrl-F... is this what you're thinking of?

3 0
3 years ago
Read 2 more answers
How many times go you need to click the format painter button to apply copied formats to multiple paragraphs one right after the
Umnica [9.8K]
Double click would be enough
6 0
2 years ago
Read 2 more answers
Which of the following can technology NOT do?
Gnesinka [82]

make our life problem free

because technology has its negative effects on humanity like Social media and screen time can be bad for mental health

And technology is leading us to sedentary lifestyles

Technology is addictive

Insomnia can be another side effect of digital devices

Instant access to information makes us less self-sufficient

Young people are losing the ability to interact face-to-face

Social media and screen time can be bad for mental health

Young people are losing the ability to interact face-to-face

Relationships can be harmed by too much tech use

4 0
2 years ago
Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organiza
ratelena [41]

Answer:

A bridge could permit access to the secure wired network from the unsecured wireless network

Explanation:

A bridge is connecting device in networking that connects two different network devices. This device is suitable to connect a secure network with an unsecured network.

8 0
3 years ago
Cindy wants to send threat information via a standardized protocol specifically designed to exchange cyber threat information. W
Dahasolnce [82]

Cindy  can choose to exchange cyber threat information in the given scenario via the use of TAXII.

<h3>What is standardized protocol?</h3>

Standardized protocols is known to be the one that gives room for people or clients to communicate with any given window manager.

Note that in the above case, Cindy  can choose to exchange cyber threat information in the given scenario via the use of TAXII.

Learn more about standardized protocol from

brainly.com/question/14672166

#SPJ1

8 0
2 years ago
Other questions:
  • Identify the function for the following computer part: Printer Question 23 options: Input
    6·1 answer
  • Generally speaking, manufacturing overhead is applied to production by means of a __________ __________ __________, which is com
    11·2 answers
  • George and Miguel want to know more about their local and online competitors and about the retail industry. What is the best way
    9·1 answer
  • What is VoIP?
    5·1 answer
  • Implement a sublinear running time complexity recursive function in Java public static long exponentiation (long x, int n) to ca
    11·1 answer
  • What is a good analogy for explaining the actions of a compiler?
    10·1 answer
  • Using the world_x database you installed in Module 1, list the countries and the capitals of each country. Modify your query to
    11·1 answer
  • There are ___ Federal Reserve Banks. Each bank is also in charge of its assigned District Banks.
    10·1 answer
  • Who plays oblox .............................
    8·2 answers
  • Basic computer programs used by a variety of companies include:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!