A sequence of folders in the folder structure that leads to a specific file or folder is called a ________
A) path B) tag C) subfolder D) hierarchy
A
You might also like to view...
MC Class______ is used when the user should choose only one option in a group.
a) Selectone. b) Checkbutton. c) Radiobutton. d) None of the above.
When the program performs a(n) ____ statement, all statements within it are performed simultaneously.
A. for B. while C. do together D. do in order
Answer the following statements true (T) or false (F)
1. Unauthorized intrusion into a computer system or network is one of the most serious threats to computer security. ?? 2. Trojan horses and viruses are confined to network based attacks. ? 3. ?Intrusion detection involves detecting unusual patterns of activity or patterns of activity that are known to correlate with intrusions. 4. Statistical approaches attempt to define proper behavior and rule-based approaches attempt to define normal or expected behavior. ? 5. ??The main advantage of the use of statistical profiles is that a prior knowledge of security flaws is not required. ??
A cell located in the third row and forth column is named _____.
A. 3D B. C4 C. D3 D. 4C