A sequence of folders in the folder structure that leads to a specific file or folder is called a ________

A) path B) tag C) subfolder D) hierarchy


A

Computer Science & Information Technology

You might also like to view...

MC Class______ is used when the user should choose only one option in a group.

a) Selectone. b) Checkbutton. c) Radiobutton. d) None of the above.

Computer Science & Information Technology

When the program performs a(n) ____ statement, all statements within it are performed simultaneously.

A. for B. while C. do together D. do in order

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Unauthorized intrusion into a computer system or network is one of the most serious threats to computer security. ?? 2. Trojan horses and viruses are confined to network based attacks. ? 3. ?Intrusion detection involves detecting unusual patterns of activity or patterns of activity that are known to correlate with intrusions. 4. Statistical approaches attempt to define proper behavior and rule-based approaches attempt to define normal or expected behavior. ? 5. ??The main advantage of the use of statistical profiles is that a prior knowledge of security flaws is not required. ??

Computer Science & Information Technology

A cell located in the third row and forth column is named _____.

A. 3D B. C4 C. D3 D. 4C

Computer Science & Information Technology