1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
4 years ago
5

Elise has just edited two photos of her cat and three different photos of her dog. She needs to save all five of these photos in

to the same folder. Which of these sets of file names will allow her to recognize all of the photos without having to open them?
A. cat_1, cat_2, dog_1, dog_2, dog_3
B. cat_dog_photos_1, cat_dog_photos_2, cat_dog_photos_3, cat_dog_photos_4, cat_dog_photos_5
C. cat_photo, cat__photo, dog_photo, dog__photo, dog___photo
D. cat_eating, cat_sleeping, dog_eating, dog_playing, dog_sleeping
Computers and Technology
2 answers:
kow [346]4 years ago
8 0

The answer is D. cat_eating, cat_sleeping, dog_eating, dog_playing, dog_sleeping

Apex

Lera25 [3.4K]4 years ago
7 0
<span>The best answer is A. cat_1, cat_2, dog_1, dog_2, dog_3. Filenames are preferably short and should state the obvious. They should be unique and distinct, with no any duplicates in any given file within the same folder. The other choices either have duplicates, vague or are way too long to be identified quickly. </span>

<span> </span>

You might be interested in
Which RFC reserves three ranges of IP addresses for private use - a single Class A (10.0.0.0-10.255.255.255), 16 Class Bs (172.1
erica [24]

Answer:

The answer is "1918".

Explanation:

The RFC stands for "remote function call", it is also known as an abbreviated form. It is an application, that responses in a technical online design Task Force, it is also known as a document, which was prepared for review by shareholders to collects some information.  

The RFC reverses is also known as an idea, that uses IP version 4 to reverse the IP address, this process is done by TCP/IP protocol, which is defined under RFC 1918.  

4 0
3 years ago
(--BRAINLIEST--)<br>Explain the types of secondary memory on the basis of data access.​
Nina [5.8K]

There are two types of secondary memories.

  1. RAM
  2. ROM

RAM:

  • RAM stands for random access memory .
  • It is expandable.
  • we can do multiple things in it.
  • Its erasable.

ROM

  • ROM stands for read only memory.
  • It is permanent .
  • We can only read in it.
  • Its permanent hence not removable.
8 0
3 years ago
Read 2 more answers
Explain your understanding of distributed object system.
Paraphin [41]

Answer:

In the distributing computing, distributed object system is the process in which the distributed object are get distributed in different address space. The distributed object system is the enhancement of the client server model.

Distributed object are basically refers to the software module which are designed in such a way, so that they work together in the network.

And it is distributed physically within the network area and the methods is executed on the basis of remote host in the distributed system.  

7 0
3 years ago
The processing of data in a computer involves the interplay between its various hardware components.
Ronch [10]

True.

Data processing involves the conversion of raw data and the flow of data through the Central Processing Unit and Memory to output devices. Each CPU in a computer contains two primary elements: the Arithmetic Logic Unit (ALU) and the control unit. The Arithmetic Logic Unit performs complex mathematical calculations and logical comparisons. On the other hand, the control unit accesses computer instructions, decodes them, and controls the flow of data in and out of the Memory, ALU, primary and secondary storage, and various other output devices.  


8 0
3 years ago
The answer for 1 and 2
Mrrafil [7]
1. A.  It is basically the definition of a political cartoon.
2. D. They used newspaper, protesting, and marches.
<span />
6 0
4 years ago
Other questions:
  • Pointsfor a failover cluster, what type of network would you use to communicate with an iscsi device?
    15·1 answer
  • Document design techniques make your document easier for readers to skim. Therefore, these techniques give your writing "High Sk
    14·1 answer
  • Which symbol is at the beginning and end of a multiline comment block? &amp;&amp;&amp; """ %%% ###
    5·1 answer
  • Which of the following is the most abstract?
    13·2 answers
  • In an experiment in which participants sat in an office and then were asked to remember what they saw in the office, participant
    6·1 answer
  • Someone talk to me please........
    5·2 answers
  • Data ____ refers to the accuracy of the data in a database
    9·1 answer
  • Which of the following statements best illustrates how value was created for eggs? when a farmer sells a chicken who is no longe
    9·1 answer
  • What feature should you enable to prevent the sidhistory attribute from being used to falsely gain administrative privileges in
    14·1 answer
  • 1.Know the BMI of the user. First, the user will input the height in meters and weight in kilograms. After inputting, the inputt
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!