I’m pretty sure it’s a network hope this helps
Answer:
a. file-naming conventions
Explanation:
File names need to follow certain criteria and constraints. Examples include:
- File names must not start with special symbols.
- File names can consist of letters,digits and special characters such as _.
- File name can contain an extension after a dot sign.
- File names must not be duplicates of an existing file.
Such constraints form part of file-naming conventions.
- file-path represents the complete path to the file in the directory structure.
- disk partition segments a hard disk into multiple volumes.
- file-path starts from the root directory and spans one or more subdirectories to the location of the actual file.
Answer:
The answer is "Option c"
Explanation:
Decisions made in secret have always been critical. Hence the want to express it before your choice is made. It is all about how you express choice. In general, they need your presentation to explain the choice that you decided, how they created it, and how it implies for just the group, that you are approaching, and wrong choices can be described as follows:
- In option a, It is used in the industry to interest.
- In option b, It is use in communication mechanism.
- In option d, It enables people to handle our activities or carry them out.
Answer:
real-time analytics
Explanation:
Real time analytics is a type of data analysis that is done immediately the data for analysis is available. This can allow users to draw conclusion or acquire new insights swiftly and immediately the data enters their system. Businesses use real time analytics when there is a need to make and execute new decisions without hesitation.
A business that wants to centralize its administrative tasks and simultaneously wants the existing system to manage and sustain the growing amount of work in a capable manner would use real-time analytics.