1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nady [450]
3 years ago
12

Create a file name that to ensure the that the file is easy to find

Computers and Technology
2 answers:
ycow [4]3 years ago
8 0
The File name would be : ABC!
levacccp [35]3 years ago
4 0

Answer:

I always name mine something like HI

or YEET i dont know

why but it works

Explanation:

You might be interested in
Your school computer library has a network that connects computers and devices within a few small rooms. what type of network do
Pachacha [2.7K]
A routed and secured network which can send internet access to all computers 

3 0
4 years ago
La computadora es un medio de comunicacion moderno?
kolbaska11 [484]
Moderno = mordern, if It does than yes!
3 0
3 years ago
Fill in the blank
EastWind [94]

Answer:

It is called the ENQUIRE database

Explanation: got it right boooiiiii

7 0
4 years ago
Read 2 more answers
Quiz #1: In Fnaf 4 After chris gets bit by Fredbear what animatronic does he start to possess and how does he die?
GalinKa [24]

Answer:

He starts to posess freddy and he dies in his sleep Which is in Fnaf 4. Freadbear crushed his skull.

Explanation:

4 0
3 years ago
Read 2 more answers
Mechanisms that combine memory, processing speed, and knowledge to regulate the analysis and flow of information within the info
gizmo_the_mogwai [7]

Answer:

control processes.

Explanation:

Mechanisms that combine memory, processing speed, and knowledge to regulate the analysis and flow of information within the information-processing system are referred to as executive/control processes.

3 0
3 years ago
Other questions:
  • . The toasting cycle of an automatic toaster is started by A. pushing the bread rack down. B. pushing the start button. C. turni
    14·2 answers
  • Is there a way to get back old messages that you didn't mean to delete??? I have a Samsung S5 and I really really need help. I d
    11·2 answers
  • Write a program that will print out statistics for eight coin tosses. The user will input either an "h" for heads or a "t" for t
    14·1 answer
  • The Internet is considered a WAN. *<br><br> True<br> False
    9·1 answer
  • In a systems development life cycle (SDLC) model, the purpose of the _____ is to create a physical model that will satisfy all d
    10·1 answer
  • The add_prices function returns the total price of all of the groceries in the dictionary. Fill in the blanks to complete this f
    15·1 answer
  • What is "mob of the dead"?
    7·1 answer
  • The term Linux Intrusion Detection System ( LIDS) refers to a command that allows an administrator to run processes as root with
    5·1 answer
  • Why would you use a computer's secondary memory?
    12·1 answer
  • Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!