File Extensions and File Naming Conventions

¡Supera tus tareas y exámenes ahora con Quizwiz!

File extensions usually consist of____________.

1-3 characters

Use short simple file names, use file and folder names that describe the content accurately, use underscores instead of spaces in file names, avoid using non-alphanumeric characters in file names, if using a date in the file name always state the date back to front "YYYYMMDD", when including a personal name in a file name give the family name first followed by the initials, avoid using words such as draft or letter as the start of a file name.

7 rules

the letters immediately shown after the last period in a file name

File extension

LastnameFirstname.yyyymmdd.Assignment

Format

Every operating system has a _____________ between a particular file extension and a particular program.

default mapping

.txt, .doc, .wav, .xls, .m

file extensions

a method of naming files that a group of users utilize to help better manage their shared files

file naming conventions

Portable Document Format File, Microsoft Word Document

file types

What are the 1-3 characters made up of?

letters or digits

If the extension is unknown to the operating system or no application mapping exists, it will prompt the user to specify the program that it would like to ________________________.

open the file with

knows what program to use in order to view, print, or edit a particular file by looking at its file extension

operating system

What do the 1-3 characters represent?

the type of file


Conjuntos de estudio relacionados

Science ESG- Loss of Biodiversity

View Set

B2 LS Grammar: Simple Past Tense - Irregular Verbs (Group 2)

View Set

amy 47 cardiac questions REVIEW again-most were on last exam

View Set

International Business Law EXAM FOUR

View Set

Bronfenbrenner's Ecological Systems Theory

View Set

Олимпиада на платформе uchi.ru

View Set

Maternity and pedi ch 2,3,4,5,6,7, review

View Set

Vocabulary ATOMS, Molecules Ions and Isotopes

View Set

C836 - Fundamentals of Information Security Study Notes

View Set