1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vova2212 [387]
3 years ago
13

While saving file names instead of using a space inbetween two words you use

Computers and Technology
2 answers:
dangina [55]3 years ago
5 0

You use underscore, also called underline, low line or low dash.  It looks like this: _

Sergeu [11.5K]3 years ago
4 0
You can use an underscore
Example “_”
You might be interested in
An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b)
aleksandr82 [10.1K]

Answer:

A

Explanation:

3 0
4 years ago
Write code that prints: Ready! numVal ... 2 1 Go! Your code should contain a for loop. Print a newline after each number and aft
DaniilM [7]

Answer:

public class ForLoops {

   public static void main (String [] args) {

       int countNum;

       int i;  

       countNum = 3;  

       System.out.println("Ready!");

       for(i = countNum;i>0;i--) {

           System.out.println(i);

       }

       System.out.println("Go!");

   }

}  

Output:

8 0
3 years ago
DJ Davon is making a playlist for an internet radio show; he is trying to decide what 1212 songs to play and in what order they
Alja [10]

There are some typos in this question as the numbers become too large and lead to undefined during calculations.

so the correct data is:

Songs = 12

Rock = 15

Blues = 20

Disco = 15

The answer & explanation for this question is given in the attachment below.

4 0
3 years ago
Choose which statement is wrong by applying your knowledge from the reading. a. A security manager works on tasks identified by
Novosadov [1.4K]

There are reasons why a statement can be wrong. The option that is a wrong statement is Since 2015, the number of unfilled cybersecurity positions has increased by 10 percent.

<h3>How are many cybersecurity jobs unfilled?</h3>

The U.S. is known to have a high total employed cybersecurity workforce and some that are unfilled positions as reported by Cyber Seek.

Studies has shown that since 2015, the number of unfilled cybersecurity positions has gone up by 50 percent. Such that  the total expected rate has been approximated to be at 1.8 million open cybersecurity positions by 2022.

Learn more about cybersecurity from

brainly.com/question/14286078

8 0
2 years ago
LAST TIME ASKING FOR APPS THAT ARE FREE THAT I DONT NEED TO PAY THE APPS HAVE TO HELP ME STOP VIRUSES FROM MY PHONE PLZ HELP THE
pashok25 [27]

Answer:

i wish i could help u but i cant find a "free" one

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • you want to search in your contacts in your email program. You enter the person's first name and last name in the search box. Yo
    8·1 answer
  • Which commercial email provider is most closely associated with Apple devices?
    9·1 answer
  • An example of software most commonly associated with productivity software is ____.
    12·1 answer
  • Where is help on this system?
    7·2 answers
  • What need did anti lock brakes address?
    10·1 answer
  • ANYONE WITH K12 OHVA HIGH SCHOOL LAPTOP! I successfully enter my schools homepage and can login. BUT once I am logged in, it say
    9·2 answers
  • Open the same text file that you have created in Exercise-Four ( in the sample output, I have created the file name personal). W
    7·1 answer
  • Pleaseeeee helppp
    5·1 answer
  • Select all steps in the list below that should be completed when using the problem-solving process discussed in this chapter.
    14·1 answer
  • What physical disk oriented performance counter should be used to determine the number of requests waiting to be processed by a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!