1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexgriva [62]
3 years ago
8

To prevent computer errors, which of the following characters should not be used in a file name?

Computers and Technology
1 answer:
Y_Kistochka [10]3 years ago
4 0

Answer:

a space, period, hyphen or underline, and since most operating systems are case sensitive you should use lowercase letters. avoid using spaces or underscores.

Explanation:

a space, period, hyphen or underline, and since most operating systems are case sensitive you should use lowercase letters. avoid using spaces or underscores.

You might be interested in
BITS wants to store information about the supervisors, including their supervisor number and the relationship to consultants. Su
Olin [163]

Answer:

Convert the table into normalize form

Explanation:

Un normalized relation of the given schedule is as

Consultant ( ConsultNum, Last Name, First Name, Street, City, ZipCode

HoursRate (SupervisorNum, Supervisor Num)

(Tasks, Description, Catagory, Price, SupervisorNum))

According to these functional dependencies :

SupervisorNum is dependencies of the SupervisiorNum

ConsltNum is dependencies of the Last Name, First Name, Street, City, ZipCode, Hours, Rate

Tasks are dependencies of Description, Category, Price

The consultant table is not in a normalized form as it contains repeating groups. Make composite keys such as Supervisor Num, Tasks and ConsltNum and convert the table in NF by removing repeating groups

Such as table in NF

Consultant

(Consult Num, Last Name, First Name, Street, City, Zip Code, Hours, Rate

Supervisor Num, Supervisor Name, Tasks, Description, Category, Price)              

5 0
3 years ago
public class Test { public static void main(String[] args) { try { method(); System.out.println("After the method call"); } catc
USPshnik [31]

Answer:

"ArithmeticException" is the correct answer for the above question.

Explanation:

Missing Information : The above question does not hold that "what is the output of the program".

  • The above question has a class that holds the two functions one function is the main function which calls the other function in a try-catch block.
  • The method function holds one run time exception which is 1/0 which is an arithmetic exception.
  • It can be handle by the help of an arithmetic class object which is defined in the first catch block.
  • Hence the print function of this catch is executed and prints "ArithmeticException".
8 0
3 years ago
What are the pros and cons of MP3 audio archives?
UkoKoshka [18]
Was this in reference to literal audio archives? If so, I don't see any cons beside possible copyright infringement.

If you're talking about the codecs themselves, then I can do that.

<span>Pros:

</span>- Widespread acceptance. Supported in nearly all hardware devices, and continually adopted by newer ones.

- Faster decoding. Much more so than FLAC, Vorbis, etc.

- Relaxed licensing schedule.

<span>Cons:
</span><span>
</span>- Lower quality and efficiency than most modern codecs. (To be fair, never really noticed this one).

- Sometimes the maximum bitrate isn't enough.

- Pretty much void/unusable for high definition audio (higher than <span>48kHz).</span>

 
7 0
4 years ago
Which of the following are possible ways to
Andru [333]

Answer:

employ ability assessments and the ability to perform tasks

Explanation:

6 0
3 years ago
Read 2 more answers
Is a display, or monitor, considered a piece of computer hardware
9966 [12]
Yes. The monitor is considered as a piece of Computer Hardware. Computer hardware is what you can physically touch, like the keyboard, mouse, monitor, disk drive, and so on.

I hope this answers your question.

Thank you,
Otaku
3 0
3 years ago
Other questions:
  • What do you remember about the difference between Canadian and US dollar (which one is greater)? Also, explain which online tool
    6·1 answer
  • manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging true or false
    10·1 answer
  • The section called Breaking Substitution Ciphers (p. 166) describes a "random substitution cipher," in which each letter of the
    11·1 answer
  • Recall the problem of finding the number of inversions. As in the text, we are given a sequence of n numbers a1, . . . , an, whi
    8·1 answer
  • A new employee has reported that print jobs are printing as garbled text. Which of the following is MOST likely the reason for t
    8·1 answer
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    9·1 answer
  • You are a running cable in a new network. You are running a series of cables from the wiring closet to the RJ-45 ports for the c
    6·1 answer
  • Write the two features of a mouse.​
    9·1 answer
  • Aurelia is designing a user interface for a new game app. Which of the following should she taken into consideration for the use
    7·1 answer
  • What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!