1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PtichkaEL [24]
3 years ago
7

Which of the following statements are true about file naming conventions? Check all of the boxes that apply.

Computers and Technology
2 answers:
Korolek [52]3 years ago
8 0

Answer:

last one check it and the second one

Explanation:

Tcecarenko [31]3 years ago
7 0

Answer:

They increase the likelihood of finding files in the future.

They help others identify files.

You might be interested in
PLEASE HELP ASAP! WILL MARK BRAINLIEST IF THE ANSWER IS CORRECT! I NEED HELP WITH THE 3RD ONE!
Bogdan [553]

Answer:

Explanation:

.1 Display all information from the customer table for all customers that have a balance that is greater than the average balance.

2. Display all information from the rep table for all representatives that have a rate which is equal to the minimum rate for representatives.

3. Display each unique description and price (no duplicates) for all parts that have a quoted price that is greater than the average quoted price for all parts ordered.

4. List all streets where either a customer or a representative is located

5 0
3 years ago
Which of the following job duties would a software developer perform?
juin [17]

<u>The most important job duty of a software developer is to develop a product/program that is easy to use and melts a customer’s need.</u>

<u></u>

Explanation:

Some other duties of  a Software developer are

  • Researching,designing and implementing new software program's and then managing them
  • Testing and evaluating the developed software program's
  • Identifying errors in the existing program's and modifying the same
  • Writing effective codes
  • employing various software tools
  • Training new users
  • Working closely with the other developers

8 0
3 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
RideAnS [48]

Answer:

True.

Explanation:

A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.

Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.

6 0
3 years ago
MTINGAENL ....
erik [133]

Answer:

Alignment

Explanation:

7 0
3 years ago
Today when Dylan turned on his computer, he noticed that the monitor was very dim. He could still see the desktop icon and text.
Amiraneli [1.4K]

Answer:

Monitor backlighting

Explanation:

Dylan haven done some troubleshooting on his computer to find out what the problem was but couldn't restore its brightness.

It then means that the Monitor backlighting caused the screen to be very dim.

The Monitor backlighting is bad or faulty.

7 0
3 years ago
Read 2 more answers
Other questions:
  • The Glow effect adds a blinking border around a chart.<br> t or f
    15·1 answer
  • 4. The same data source can be used multiple times in creating mail-merge documents.
    7·1 answer
  • A technician has just installed a video card in a PC. The video card is not working, althoughit was working fine on the test ben
    6·1 answer
  • Which of the following statements is NOT true about url extension?
    10·2 answers
  • Write a function that will sum all of the numbers in a list, ignoring the non-numbers. The function should takes one parameter:
    8·1 answer
  • Where is the third vanishing point in the three point perspective
    8·1 answer
  • Guys how can i video my self from my laptop <br> my laptop is (lenovo)
    8·2 answers
  • PLEASE HELP FIRST ONE TO ANSWER WILL GET BRAINLIEST!!
    10·1 answer
  • ________ is the use of information technology to support the sharing of content among networks of users.
    14·1 answer
  • Three types of query​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!