1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PtichkaEL [24]
3 years ago
7

Which of the following statements are true about file naming conventions? Check all of the boxes that apply.

Computers and Technology
2 answers:
Korolek [52]3 years ago
8 0

Answer:

last one check it and the second one

Explanation:

Tcecarenko [31]3 years ago
7 0

Answer:

They increase the likelihood of finding files in the future.

They help others identify files.

You might be interested in
Problem 1 Calculating the tip when you go to a restaurant is not difficult, but your restaurant wants to suggest a tip according
DIA [1.3K]

Answer:

bill = float(input("Enter the bill amount: "))

rating = int(input("Choose a rating: 1 = Totally satisfied, 2 = Satisfied, 3 = Dissatisfied.: "))

if rating is 1:

   tip = bill * 0.2

elif rating is 2:

   tip = bill * 0.15

elif rating is 3:

   tip = bill * 0.1

print("The rating is: " + str(rating))

print("The tip is: $%.2f" % (tip))

Explanation:

*The code is in Python

- Ask the user for the <em>bill</em> and <em>rating</em>

- Depending on the <em>rating</em>, calculate the <em>tip</em> using <u>if else</u> statement i.e. If the rating is chosen as 1, calculate the tip by taking 20 percent of the bill.

- Print the <em>rating</em> and the <em>tip</em>

4 0
3 years ago
In 2-5 paragraphs, describe the points that Kendra needs to consider when choosing a telecommunications technology to meet her n
never [62]

Answer:

For marketing requirements, various communication mediums like digital communication medium, as well as non digital traditional communication medium can be used. Some like Blogs, Article directories, forums etc. can be used.

However, the AI, ML, DL and the traditional statistical analysis from Data Science can also be used. You need to install on your blog the chat-bots, And through the Chat-bots we can make a data set, that is in fact automatically generated, and contains email, phone numbers, addresses etc, and this data base can be used to run the Amazon Sage-makers. and a lot of meaningful information can be achieved through the prepared data-set through the Sage-maker.

Thus, you can find out quite easily what is good.

Sage maker, Chat bots and Blog technology is quite cost effective as well.

Explanation:

The above details covers all the requirements.

7 0
3 years ago
What is a computer meaning
goldenfox [79]

Answer:

computer means an electronic machine which process raw data and gives meaningful information to the user

7 0
3 years ago
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such
finlep [7]

Answer:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms.

Explanation:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms. Where a Rootkit provides features like remote access to users, it also opens ways for attackers. It helps in hiding the malicious software. Rootkits can be installed on the victim systems by phishing attack or social engineering techniques ..

6 0
3 years ago
Write an algorithm to calculate the sum of number between 1 to 100​
mart [117]

Algorithm

STEP 1: START.

STEP 2: DEFINE n, i, j.

STEP 3: SET sum =0.

STEP 4: SET n =100.

STEP 5: REPEAT STEP 6 to STEP 10 UNTIL i<=n.

STEP 6: REPEAT STEP 7 and STEP 8 UNTIL j<=i/2.

STEP 7: if i%j ==0.

STEP 8: sum =sum + j.Algorithm

STEP 1: START.

STEP 2: DEFINE n, i, j.

STEP 3: SET sum =0.

STEP 4: SET n =100.

STEP 5: REPEAT STEP 6 to STEP 10 UNTIL i<=n.

STEP 6: REPEAT STEP 7 and STEP 8 UNTIL j<=i/2.

STEP 7: if i%j ==0.

STEP 8: sum =sum + j.

7 0
2 years ago
Read 2 more answers
Other questions:
  • A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a par
    12·1 answer
  • What is something you can do to stay connected to the relationships in your life while we spend this time at home?
    13·1 answer
  • Which of the following protects against cave-ins? A. All answer choices protect against cave-ins B. Shielding C. Shoring D. Slop
    5·2 answers
  • In round-robin scheduling,a) the time quantum should be larger than the context switch time. b) the time quantum should be as sm
    15·1 answer
  • Which of the following describes ETL? a) A process that transforms information using a common set of enterprise definitions b) A
    14·1 answer
  • echnician A says that underinflation can increase the rolling resistance of a tire. Technician B says that underinflation can ca
    9·1 answer
  • Without using any additional variables, and without changing the values of ndays or the elements of the parkingTickets array, wr
    14·1 answer
  • When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack"
    13·1 answer
  • Write a method that accepts a string as an argument and checks it for proper capitalization and punctuation. The method should d
    14·1 answer
  • What is the best example of personally identifiable information.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!