1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentina_108 [34]
2 years ago
6

The wildcard character * (asterisk/start) and ? (question mark) are the same and can be use interchangeably.

Computers and Technology
1 answer:
vova2212 [387]2 years ago
6 0
The answer is false.
You might be interested in
Company A is setting up a network of mostly Windows machines. Which networking file system protocol would you recommend for maxi
maxonik [38]

Answer:

For maximum interoperability, NFSv4 is recommended.

Explanation:

When setting up a network of mostly windows machines, it is better to use NFSv4 because it includes performance improvements, mandates strong security, and a stateful protocol.

4 0
3 years ago
Need the answer ASAP!!!!!!!!!!!!! I’ll mark brainliest if correct
Dmitriy789 [7]

Answer: review; quality

Explanation:

SQA refers to the ongoing process that can be found in the Software Development Life Cycle whereby the developed software is checked in order to ensure that the desired quality measures are met. The SQA processes is vital as it checks for the quality in every development phase.

The first step of the SQA process is to (review) the software development process. The next step is to set (quality) attributes.

6 0
2 years ago
. Each ____ on a menu performs a specific action.
Fofino [41]
The answer would be d, none kf the above.
4 0
3 years ago
What wireless security technology contains significant flaws and should never be used?
aalyn [17]

The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

<h3>What is the primary weakness of Wired Equivalent Privacy WEP )?</h3>

Wired Equivalent Privacy (WEP) is known to be a kind of a security protocol, that is seen in the IEEE Wireless Fidelity (Wi-Fi) standard known to be 802.11b.

Note that the primary weakness of wired equivalent privacy (WEP) is that It functions only on some given brands of APs and as such, The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

Learn more about wireless security from

brainly.com/question/25633298

#SPJ1

5 0
1 year ago
List any two different between primary memory and secondary memory.​
nikitadnepr [17]

Answer:

Primary memory is directly accessible by Processor/CPU. Secondary memory is not directly accessible by the CPU. ... The memory devices used for primary memory are semiconductor memories. The secondary memory devices are magnetic and optical memories

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the purpose of lookup tables in spreadsheet software
    13·2 answers
  • To use a stored address, C provides us with an indirection operator, ____.
    6·1 answer
  • Name types of operating system with example
    5·1 answer
  • Georgenotfound??? question mark??
    15·2 answers
  • What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
    13·1 answer
  • What does Putting a word in quotation marks on your search bar do on google?
    12·1 answer
  • You Could Never Size Me UP! Been Doing This Sh*t A Long ⏱time
    15·1 answer
  • the image on the right was prooduced by a computer. it shows a complex molecu;e consisting of many atoms. what would be an advan
    6·1 answer
  • Choose the answer.
    15·1 answer
  • If you're connected to a switch and your NIC is in promiscuous mode, what traffic would you be able to capture
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!