1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anyanavicka [17]
3 years ago
9

Using symbols in a file name is a good idea. True False

Computers and Technology
2 answers:
zavuch27 [327]3 years ago
4 0
False. File names should only contain letters, underscores, periods, and dashes.
sp2606 [1]3 years ago
3 0

False you should try and be as accurate as possible so that you can Identify what the file is in the future

You might be interested in
Susan is a network administrator and is setting up her company's network. In the process to determine an open port on a firewall
Dovator [93]

Answer:

poop head is big butt

Explanation:

soorru

4 0
2 years ago
En que parte del mall del rio venden tarjetas de google play en cuenca​
JulijaS [17]

chxgfk hcyskvuct auhchovuzq vuvscisv

6 0
3 years ago
If your laptop is not able to connect to your wireless network, which of the
krok68 [10]
The answer is A! Hope this is helpful!
8 0
2 years ago
Read 2 more answers
The compiler decides which version of a polymorphic method to call at compile time
astra-53 [7]

Answer:

T

Explanation:

Hope it's help.you.

plz Mark me as brinliest

Thank you

8 0
3 years ago
Under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy. A given bank has just implemented its online banki
d1i1m1o1n [39]

Answer:

System/Application Domain and LAN-to-WAN Domain.

Explanation:

The Gramm-Leach-Bliley-Act is also referred to as the Financial Services Modernization Act of 1999. It was enacted by the 106th Congress of the United States of America and it requires that financial institutions explain to their customers the information sharing policies and ensure that customer sensitive data (privacy) is safeguarded.

This, under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy.

In this scenario, a given bank has just implemented its online banking solution that allows customers to access their accounts and perform transactions via their computers or personal digital assistant (PDA) devices.

Hence, online banking servers and their public Internet hosting would fall within the System/Application Domain and LAN-to-WAN Domain.

In an IT infrastructure, there are seven main domains and these are the: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application.

3 0
3 years ago
Other questions:
  • Computer-integrated manufacturing (CIM) includes manufacturing systems that have:
    7·1 answer
  • In what era did plants begin to flourish?
    9·1 answer
  • Name one advantage of modular switches over fixed-configuration switches.
    5·1 answer
  • What car Is this because I want it for my daughters sweet 16th birthday
    13·1 answer
  • How many suggestions available in correcting misspelled words<br>​
    11·1 answer
  • Identify which statement explains why a programmer would break a logic problem into steps.
    13·2 answers
  • A weighted GPA counts__more highly.
    12·1 answer
  • This shows you where text will appear as you type.
    14·1 answer
  • When code is compiled it
    6·2 answers
  • Which longstanding restaurant chain closed its last location in lake george, new york?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!