1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nitella [24]
3 years ago
13

Using your own computer, give the name of the operating system that runs it and give examples of five legal file names. Then cre

ate examples of five illegal file names, attempt to use them on your system to save a file, and describe what error message you received. Finally, explain how you could fix the file-name to work on your system.
Computers and Technology
1 answer:
Vika [28.1K]3 years ago
7 0

Answer:

Name of Operating System: Ubuntu

Five legal file names:

inventory.txt

total.txt

NIKKAH.txt

Defaulter.txt

studenT.txt

Five illegal file names:

wel/come.txt

..

MY>note.txt

.

my<work.yxt

Explanation:

To fix the illegal name:

1. Remove the special character, so it becomes welcome.txt

2. Remove the double dot and rename using text characters

3. Remove the special character, so it becomes MYnote.txt

4. A file cannot be named using dot. So we rename to a textual name

5. Remove the special character, so it becomes mywork.txt

Some additional rule for naming of files legally in Unix is that, you cannot use a reserved word to name your file. Starting a file name with number is allowed. Starting a file name with dot make the file to be hidden.

You might be interested in
___________ is a task pane used to correct grammar errors; opens when you click the Spelling &amp; Grammar button in the Proofin
BaLLatris [955]

Answer:

Spelling Task Pane

Explanation:

According to my research on Microsoft Office Studio, I can say that based on the information provided within the question the feature being mentioned in the question is called the Spelling Task Pane. By selecting this pane word will offer various grammar and spelling assistance, such as correcting words and offering one or more suggestions.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

7 0
3 years ago
Read 2 more answers
Describe how implementation of a raid level 2 system would be beneficial to a university payroll system
lisabon 2012 [21]

<span>The RAID level 2 could give high information exchange rates and would be straightforward contrasted with other Raid levels. Be that as it may, it has a high cost and would need a high rate move required with a specific end goal to legitimize this cost.</span>

4 0
4 years ago
By issuing concert tickets on the blockchain, fans can verify transfer of ownership from one digital wallet to another, rather t
MrRa [10]

Answer:

a. double-cross

Explanation:

 Using the blockchain technology in the case of issuing concert tickets solves the problem with double-cross, which is when someone cheats another person who had trusted in them for some transaction. <em>A great asset with blockchain is the transparency with all the transactions because they are registered and cannot be erased or changed.</em>

3 0
3 years ago
Describe how MICR is used to read these details from the cheque​
KatRina [158]

Answer:

A MICR device reading the magnetic ink on a cheque. (the ink contains iron particles). This special ink is used to write customer account numbers on the bottom of cheques. The MICR device reads the account numbers then converts it to a form the computer can understand.

Explanation:

A MICR device reading the magnetic ink on a cheque. (the ink contains iron particles). This special ink is used to write customer account numbers on the bottom of cheques. The MICR device reads the account numbers then converts it to a form the computer can understand.

7 0
3 years ago
(tco 8) the process of granting a user access to an application is called _____.
Scrat [10]

I guess the correct answer is Authentication.

The process of granting a user access to an application is called Authentication.

3 0
3 years ago
Other questions:
  • As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she
    6·1 answer
  • What are the pros and cons of editorial anonymity?
    13·1 answer
  • PLEASE HELP POWER POINT:
    8·2 answers
  • If we are using an 4-character password that contains only lowercase English alphabetic characters (26 different characters), ho
    15·2 answers
  • Which HTML tag is used to add a paragraph to a web page?
    15·1 answer
  • Grace is the editor of her school newspaper. Which feature of a word processing program would she use to make her changes visibl
    7·2 answers
  • Name all mario kart games in order
    15·2 answers
  • Which one you choosing? PS5 OR THE XBOX SERIES X???
    14·2 answers
  • I need to reverse a inputted word using for loops with range 0 to the input word and increment 1.
    5·1 answer
  • 3. When code tracing, why is it important to iteratively test parts of the program?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!