The maximum allowable filename in current Unix versions is ____.

A. 8 characters plus an optional period and 3-character extension
B. 14 characters
C. 155 characters
D. 255 characters


Answer: C

Computer Science & Information Technology

You might also like to view...

When an AP accepts or rejects a wireless device it sends a(n) ____ frame.

A. association request B. association response C. authentication D. reassociation

Computer Science & Information Technology

Explain the following:

(a) Why embedded SQL requires a precompiler (b) Why a database operation has to be prepared before it can be executed. Why embedded SQL can use host variables in SQL statements and JDBC cannot (c) The difference between INSENSITIVE and KEYSET DRIVEN cursors (d) Why deferred constraint checking is preferable in most transaction processing applica- tions. (e) What are the advantages of stored procedures (f) How can the same JDBC program be used to access different DBMSs

Computer Science & Information Technology

__________ is a HIPAA mandated standard format for electronic claims transactions

a. Version 5010 b. Version 1 c. ICD-9 d. ICD-10

Computer Science & Information Technology

Which of the following protocols are used to transfer files between two systems?(Select TWO).

A. RIP B. SCP C. FTP D. NTP E. SNMP

Computer Science & Information Technology