1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nitella [24]
3 years ago
13

Using your own computer, give the name of the operating system that runs it and give examples of five legal file names. Then cre

ate examples of five illegal file names, attempt to use them on your system to save a file, and describe what error message you received. Finally, explain how you could fix the file-name to work on your system.
Computers and Technology
1 answer:
Vika [28.1K]3 years ago
7 0

Answer:

Name of Operating System: Ubuntu

Five legal file names:

inventory.txt

total.txt

NIKKAH.txt

Defaulter.txt

studenT.txt

Five illegal file names:

wel/come.txt

..

MY>note.txt

.

my<work.yxt

Explanation:

To fix the illegal name:

1. Remove the special character, so it becomes welcome.txt

2. Remove the double dot and rename using text characters

3. Remove the special character, so it becomes MYnote.txt

4. A file cannot be named using dot. So we rename to a textual name

5. Remove the special character, so it becomes mywork.txt

Some additional rule for naming of files legally in Unix is that, you cannot use a reserved word to name your file. Starting a file name with number is allowed. Starting a file name with dot make the file to be hidden.

You might be interested in
Compare and contrast how the roles of women and men in society are changing​
Tems11 [23]

Answer:

Society is run with the everyday changing and evolving roles of men and women. Taking instances from the past, it can be very well said that the society has seen an evolution in the changing roles of men and women.

In ancient times, men were dominant. Men were only meant to earn and provide for their family and women were only meant to cook, clean their house and raise the kids and looking after their domestic animals. But with the advancement of time, women began to grow in the industry and business field. Slowly and gradually taking baby steps, women have managed to climb a mountain facing each and every hurdle of stereotypes and rituals to prove their worth. Now it can be very well said that women are no less than men and have proper significance in growth of society ethically and economically as well.

4 0
3 years ago
_An electronic device used for processing data.
Gwar [14]

Answer:

A computer is an electronic machine that processes raw data to give information as output. An electronic device that accepts data as input, and transforms it under the influence of a set of special instructions called Programs, to produce the desired output (referred to as Information).

Explanation:

4 0
3 years ago
Read 2 more answers
Which elements of a myth appear in this story from early babylon
g100num [7]
-a setting that may be fake
- Supernatural being/character
- Conflict/ the plot of the story
7 0
3 years ago
Describe at least three virus scanning techniques
Natasha_Volkova [10]

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

4 0
3 years ago
Give an example of how loops are used in programming Kturtle​
tankabanditka [31]

Answer:

Explanation:

KTurtle is an educational programming environment for turtle graphics. It is released under the open-source GNU General Public License and is part of the KDE Project since KDE3. KTurtle includes an IDE and a programming language which is loosely based on Logo and is intended for teaching programming.

5 0
3 years ago
Other questions:
  • What is a Network-layer routing technology that enables a group of workstations to share a single registered address?
    5·1 answer
  • When does a kernel panic occur?
    12·2 answers
  • A group of computers that are interconnected order to share information or document is called a
    12·2 answers
  • Difference between query and filter<br><br>​
    12·1 answer
  • Which event most led to a reduction in the size and cost of computers? a. invention of the Bessemer converter b. development of
    8·2 answers
  • So lets see what you know...Write me a short code and include a detailed explanation of the language used and what the out come
    7·1 answer
  • In which type of modulation is a 1 distinguished from a 0 by shifting the direction in whichthe wave begins?
    14·1 answer
  • How are hyperlinks created and used within a presentation? Check all that apply. Hyperlinks are set to open another source file.
    7·2 answers
  • HOMEWORK: Bud, Not Buddy I NOTICE... What do you see? chpter 3-4<br><br>​
    14·1 answer
  • Which of the following responses is the best example of a problem that can be solved using a computer program?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!