1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antoniya [11.8K]
3 years ago
8

What is the maximum number of characters you can have in a file name​

Computers and Technology
1 answer:
Leokris [45]3 years ago
5 0

Answer:

255 number of characters including space, \ etc.

You might be interested in
Which of the following are breach prevention best practices?Access only the minimum amount of PHI/personally identifiable inform
Rudiy27

Answer:

All of this above.

Explanation:

All the mentioned practices can be use to prevent breaches.

6 0
3 years ago
Chase lives in Oregon but works for a company that is located in Florida. What business trend is this an example us?
shtirl [24]

Answer:

The business trend wherein Chase works for a company that is located in Florida while he is living in Oregon is an example of remote workforce business trend.

Remote workers are those workers who does their job outside of a customary type of office.

8 0
4 years ago
Read 2 more answers
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as:
icang [17]
~Hello there! ^_^

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as..?

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as botnets.

Hope this helps~





3 0
4 years ago
If the object instance is created in a user program, then the object instance can access both the public and private members of
rewona [7]

Answer:

False

Explanation:

The private member of a class is not accessible by using the Dot notation ,however the private member are those which are not accessible inside the class they are accessible outside the class  .The public member are accessible inside the class so they are accessible by using the dot operator .

<u>Following are the example is given below in C++ Language </u>

#include<iostream>   // header file

using namespace std;  

class Rectangle

{    

   private:  

       double r; // private member  

   public:      

       double  area()  

       {     return 3.14*r*r;  

       }        

};  

int main()  

{    

  Rectangle r1;// creating the object  

   r1.r = 3.5;  

 double t= r1.area(); // calling

cout<<" Area is:"<<t;  

   return 0;  

}  

Output:

compile time error is generated

<u>The correct program to access the private member of class is given below </u>

#include<iostream>   // header file

using namespace std;  

class Rectangle

{    

   private:  

       double r; // private member  

   public:      

       double  area()  

       {    

r1=r;

double t2=3.14*r2*r2;

return(t2); // return the value  

       }        

};  

int main()  

{    

  Rectangle r1;// creating the object  

   r1.r = 1.5;  

 double t= r1.area(); // calling

cout<<" Area is:"<<t;  

   return 0;  

}  

Therefore the given statement is False

5 0
4 years ago
Which generation is called the new silent generation? A. Generation X B. the homelander generation C. the millennial generation
____ [38]

Which generation is called the new silent generation?

A. Generation X

<u>B. the homelander generation </u>

C. the millennial generation

D. the boom generation

6 0
3 years ago
Other questions:
  • Using Karnaugh maps, simplify the following Boolean function:
    14·1 answer
  • The difference between natural and technological system
    9·1 answer
  • All resources are limited. Which of the following is NOT a resource?
    11·1 answer
  • What statement best decribes the relashionship bewteen science and technoligy?
    11·2 answers
  • What is the network id with cidr notation for the ip address 172.16.32.108 with the subnet mask 255.255.255.0?
    10·1 answer
  • Gear systems with __________ can have both drive and driven gears on the same shaft. a. an odd number of gears b. an even number
    6·1 answer
  • Pre-made, copyright-free illustrations are called __________. apps clip art graphic design stock photos
    6·1 answer
  • Give four examples of devices which are both<br>Input and Output to a Computer.​
    12·1 answer
  • Mingji is working to transfer photos from her digital camera to her computer. While
    11·1 answer
  • Which step do you think is most useful from big data life cycle.why?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!