1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EleoNora [17]
3 years ago
13

Which of the file names below follows standard file naming convention

Computers and Technology
1 answer:
svetlana [45]3 years ago
5 0

A File Naming Convention (FNC) is a framework for naming your files in a way that describes what they contain and how they relate to other files. Developing an FNC is done through identifying the key elements of the project, the important differences and commonalities between your files.

To ensure that files are sorted in proper chronological order the most significant date and time components should appear first followed with the least significant components. If all the other words in the filename are the same, this convention will allow us to sort by year, then month, then date.

Files should be named consistently
File names should be short but descriptive (<25 characters) (Briney)
Avoid special characters or spaces in a file name
Use capitals and underscores instead of periods or spaces or slashes
Use date format ISO 8601: YYYYMMDD
Include a version number (Creamer et al.)
Write down naming convention in data management plan
You might be interested in
Rachel is a junior system administrator for a network with a single Active Directory domain. The network has just expanded to in
Pepsi [2]

Answer: Ask a member of the Enterprise Admins group to authorize the server.

Explanation:

From the information given, we are informed that Rachel installed a new server running Windows Server 2016 on the new subnet and configure it as a DHCP server but then realizes that the DHCP server service has started, but that the server does not respond to DHCP lease requests.

In this case, the reason for this can be attributed to the fact that the server hasn't been authorized, therefore, she can ask a member of the Enterprise Admins group to authorize the server.

4 0
3 years ago
Create a program that compares the unit prices for two sizes of laundry detergent sold at a grocery store.
astraxan [27]

Complete Question:

Create a program that compares the unit prices for two sizes of laundry detergent sold at a grocery store. Console Price Comparison Price of 64 oz size: 5.99 Price of 32 oz size: 3.50 Price per oz (64 oz): 0.09 Price per oz (32 oz): 0.11

Using Python

Answer:

<em>This program does not make use of comments (See explanation section)</em>

price64 = float(input("Price of 64 oz size: "))

price32 = float(input("Price of 32 oz size: "))

unit64 = price64/64

unit32 = price32/32

print("Unit price of 64 oz size: ", round(unit64,2))

print("Unit price of 32 oz size: ", round(unit32,2))

if unit64>unit32:

     print("Unit price of 64 oz is greater" )

else:

     print("Unit price of 32 oz is greater" )

Explanation:

This line prompts the user for the price of 64 oz size

price64 = float(input("Price of 64 oz size: "))

This line prompts the user for the price of 32 oz size

price32 = float(input("Price of 32 oz size: "))

This line calculates the unit price of 64 oz size

unit64 = price64/64

This line calculates the unit price of 32 oz size

unit32 = price32/32

This next two lines print the unit prices of both sizes

print("Unit price of 64 oz size: ", round(unit64,2))

print("Unit price of 32 oz size: ", round(unit32,2))

The next line compares the unit prices of both sizes

if unit64>unit32:

This line is executed if the unit price of 64 oz is greater than 32 oz

     print("Unit price of 64 oz is greater" )

else:

This line is executed, if otherwise

     print("Unit price of 32 oz is greater" )

4 0
3 years ago
What are the basic functions of an operating system? List any four of them.​
sammy [17]

Answer:

Following are some of important functions of an operating System.

Memory Management.

Processor Management.

Device Management.

File Management.

Security.

Control over system performance.

Job accounting.

Error detecting aids.

Explanation:

PLS MAKE ME AS BRAINLIST

5 0
3 years ago
You are a network engineer tasked with performing a site survey for a multiple-channel architecture (MCA) system in a three-stor
blagie [28]

Answer:

20/20 vision, and quick internal math if you are talking about human characteristics. If you are talking about the sight survey itself and considering other aspects; You would want to make sure the site has an easily accessible area for the client, doing this by considering the following: easy access, building height (cell phone tower correspondents), multi-channel sight points, and wiring less visible than the access point.

Explanation:

5 0
3 years ago
The /home/gshant/smp directory contains several files. The directory and files need to be removed. The current working directory
kherson [118]

Explanation:

Whenever a user types in a command at the command line that is not built into the shell or that does not include its absolute path and then presses the Enter key, the shell searches through those directories, which constitute the user's search path, until it finds an executable file with that name.

3 0
3 years ago
Other questions:
  • If a = 3 and b = a+3 find value of b.
    14·2 answers
  • What is the Documenter?
    10·1 answer
  • Write a function stats that takes an array and the number of elements in the array. Then, it computes and prints the minimum val
    8·1 answer
  • Que quiere decir analogico
    6·1 answer
  • HI brainly friends....<br> Pease thanks my answers I will also thank your answers
    11·1 answer
  • The technology dealing with robots is called
    6·1 answer
  • Which of the following is not a valid C language<br>int​
    6·1 answer
  • _________________ is the logical operator if either conditions is True, then the whole statement is TRUE.
    7·1 answer
  • What is considered an important ethical consideration when working with families
    13·1 answer
  • Cisco cyber security would classify this email?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!