1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ioda
3 years ago
12

Which character is cannot be used in a file name _ (underscore)/ (backslash)- (hyphen) % ( percent)

Computers and Technology
1 answer:
Crazy boy [7]3 years ago
4 0
In Windows a (real) backslash is a path separator. The % is involved with DOS variables.
You might be interested in
List two items that are required to make a text file into a bash script.
Olenka [21]

Answer:

Explanation:

First a header is needed indicating which bash will be used (sh, zsh, bash, etc.), then it is necessary to change the file extension so that the system recognizes it as an executable file and no longer as text

6 0
3 years ago
Anti-lock braking systems can significantly.... a. impede your braking stability. B. improve your braking stability. C. improve
Setler79 [48]
Here is the answer that would best complete the given statement above. Anti-lock braking systems can significantly improve your braking stability. The correct answer would be therefore, option B. Anti-lock braking systems is for safety purposes in order for to prevent <span>the wheels from </span>locking<span> up (ceasing rotation) and avoiding uncontrolled skidding. Hope this answer helps.</span>
7 0
4 years ago
What are the functions of information technology?
Gekata [30.6K]

There are six basic functions of IT.

1. Capture: Compiling detailed records of activities.

2. Processing: Converting, analyzing, computing and synthesizing all forms of data and information.

3. Generation: Organizing information into a useful form.

4. Storage: Retaining information for further use.

5. Retrieval: Locating and copying stored data or information for further processing or for transmission to another user.

6. Transmission: Distributing information over a communication network.

3 0
2 years ago
Which of the following is not considered a flow in supply chains?
kramer
I don’t know if this helps, but here are three types of main flows: flow of material/goods, flow of money/cash, and flow of information.
5 0
2 years ago
Adam, a flower shop owner, wants to drive phone calls to his store. Which Adwords tool should he use to track how many calls res
Kipish [7]

Answer:D)Conversion tracking

Explanation:Conversion tracking is the tool that helps the user to know about the interaction of the ad given by him with customer. It helps in the tracking in the ways like calls from ads, call conversion importing,mobile website gaining the number of clicks etc.

Thus,  Adam needs to use the conversion tracking tool which for driving the calls towards his store.He can track the effectiveness of the ad which drives the calls.

Other options given are incorrect because they cannot keep the record of the  ads seen by the customer with the help of tracking. Thus the correct option is option(D).

8 0
3 years ago
Other questions:
  • In a paragraph of no less than 125 words, describe how you would insert a graph in your word-processing document.
    8·2 answers
  • What was the purpose of the Declaration of Independence and what led to it​
    10·1 answer
  • How to do this? ICT Excel there's a screenshot attached
    6·1 answer
  • What need most led to the creation of the Advanced Research Projects Agency Network? DARPA wanted scientists to be able to colla
    10·2 answers
  • A public Wi-Fi risk that can be minimized by only visiting
    5·1 answer
  • Suppose the length of each packet is L bits. Also, assume the path from a server to a client includes N links each of rate R (i.
    8·1 answer
  • assume an int array, candy, stores the number of candy bars sold by a group of children wherecandy[j] is the number of candy bar
    7·2 answers
  • I am sorting data that is stored over a network connection. Based on the properties of that connection, it is extremely expensiv
    14·1 answer
  • When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password
    11·1 answer
  • What is the value of the variable named result after the following code executes?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!