1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EleoNora [17]
3 years ago
13

Which of the file names below follows standard file naming convention

Computers and Technology
1 answer:
svetlana [45]3 years ago
5 0

A File Naming Convention (FNC) is a framework for naming your files in a way that describes what they contain and how they relate to other files. Developing an FNC is done through identifying the key elements of the project, the important differences and commonalities between your files.

To ensure that files are sorted in proper chronological order the most significant date and time components should appear first followed with the least significant components. If all the other words in the filename are the same, this convention will allow us to sort by year, then month, then date.

Files should be named consistently
File names should be short but descriptive (<25 characters) (Briney)
Avoid special characters or spaces in a file name
Use capitals and underscores instead of periods or spaces or slashes
Use date format ISO 8601: YYYYMMDD
Include a version number (Creamer et al.)
Write down naming convention in data management plan
You might be interested in
Post as a reply your example of "data, which is processed into information" case - examples should not necessarily be related to
taurus [48]

Answer:

can u be more specific so that I can helo u?

8 0
3 years ago
What is the difference between cybercrime and cyber security?
Klio2033 [76]

Answer: Cybersecurity is ultimately about protecting government and corporate networks, seeking to make it difficult for hackers to find and exploit vulnerabilities. Cybercrime, on the other hand, tends to focus more on protecting individuals and families as they navigate online life.

Explanation:

3 0
3 years ago
Which is an unethical use of technology and resources at the workplace?
Greeley [361]
The answer is B. sharing a coworker’s performance scores with your colleagues
6 0
3 years ago
Read 2 more answers
Which of the following are examples of structured data?
Burka [1]

Answer:taffif

Explanation:

4 0
4 years ago
Which window shows instructions for a lab activity?
Svetach [21]

The window that shows instructions for a lab activity is known as the Cisco Packet Tracer Activity window.

<h3>What is Packet Tracer activity?</h3>

Cisco Packet Tracer is known to be a form of a comprehensive networking technology that is made for lecture and it is also a learning tool that gives a kind of a special combination that are made up of realistic simulation and visualization experiences as well as assessment, activity authoring capabilities, and others.

Hence, The window that shows instructions for a lab activity is known as the Cisco Packet Tracer Activity window.

Learn more about computer windows from

brainly.com/question/25243683

#SPJ1

4 0
2 years ago
Other questions:
  • Under which tab can you find the options for reusing slides from other presentations
    5·1 answer
  • Specification of database requirements falls under which category of database​ administration?
    8·1 answer
  • In a relational database design, all relationships are expressed by ________.
    10·1 answer
  • Which of the following subjects is considered technical education
    11·1 answer
  • Mary wants to create 3D shapes, refraction, and cloud patterns in an image. Which filter should Mary use?
    5·1 answer
  • What is interest? How does interest affect credit card purchases?
    11·1 answer
  • If opening capital is ks 70000 and closing capital is ks 90000 what is the amount of profit or loss​
    14·1 answer
  • Un polímero sintético es renovable o no renovable
    11·1 answer
  • Will give 5 star and mark brainleist
    14·1 answer
  • A__ is a part of a GUI that allows a specific type of interaction with the user.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!