1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olin [163]
2 years ago
12

File names should be limited to 144 characters. true or false

Computers and Technology
1 answer:
Pepsi [2]2 years ago
5 0

Answer:

True.

Explanation:

For easier recalling of file names and quicker accessibility...

A cheerful teen willing to help,

who listens to "ROAR,"

stay salty...

You might be interested in
Distinguish<br> between formal and Informal<br> Information System<br> Information systems
Harlamova29_29 [7]

Explanation:

Formal; A formal information system is based on

the organization represented by the organization chart.

Informal; The informal information system is

employee based system designed

to meet personal and vocational needs

and to help in solution of work-related problems.

5 0
2 years ago
How can you know if the person or organization providing the information has the credentials and knowledge to speak on this topi
Minchanka [31]

Answer:

The affiliation of the writer is that She is on the staff at the Center for Food Safety (CFS).

Explanation:

CFS stands for the Center for Food Safety which is the national non-profitable public environmental and interest advocacy organization that is working for protect the human health and environment by the curbing use of the harmful food productions technologies and by the promoting an organic and other form of the sustainable agriculture.

7 0
3 years ago
Revenue xls en excel
igor_vitrenko [27]
Whast does this mean

5 0
3 years ago
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
The concept of a process in an operating system embodies two primary characteristics, one of which is:
miv72 [106K]

Answer:

Resource Ownership and Scheduling execution

Explanation:

In process characteristic the characteristic is

  • Resource ownership
  • Scheduling / Execution

In Resource ownership, the OS performs a protection function where unwanted interference in processes are with resources

In scheduling execution, the process has execution state and scheduled. They can be separated by resource ownership.

The dispatching of the process is the lightweight process, and it is multi-threading. The ability of the operating system supports the single concurrent process.

The process is a unit in the resource protection and protected the CPU and other processes. It contains the multiple thread execution

Each thread contains the running, ready state and saved the thread context and access the memory. Some necessary activities of the various threads are the same address space and the resources.

7 0
3 years ago
Other questions:
  • Write the method public static doublell quizAverages (double (1 scores). which takes a 2D array of doubles that represent quiz s
    11·1 answer
  • People use a computer connected to the internet to manage financial accounts
    15·1 answer
  • 1
    5·2 answers
  • 2. What is a cap? (0.5 points)
    9·1 answer
  • Given a variable temps that refers to a list, all of whose elements refer to values of type float, representing temperature data
    10·2 answers
  • The need to strike a<br>- among work, life, family, and other responsibilities is<br>universal.​
    15·1 answer
  • In most programming languages, the compiler carries a preprocessing step to determine if certain statements will compile. For in
    7·1 answer
  • Can someone be my friend,don't friend me until i ask you Questions
    14·1 answer
  • Which of the expressions is false? when a = 10 and b = 4
    8·1 answer
  • _____is used to organize and modify the properties of the current selection.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!