Windows XP supports __________.
a. FAT
b. FAT 32
c. NTFS
d. all of the above
d. all of the above
You might also like to view...
A file has r=20,000 STUDENT records of fixed-length. Each record has the following fields: NAME (30 bytes), SSN (9 bytes), ADDRESS (40 bytes), PHONE (9 bytes), BIRTHDATE (8 bytes), SEX (1 byte), MAJORDEPTCODE (4 bytes), MINORDEPTCODE (4 bytes), CLASSCODE (4 bytes, integer), and DEGREEPROGRAM (3 bytes). An additional byte is used as a deletion marker. The file is stored on the disk whose parameters are given in Exercise 17.27.
(a) Calculate the record size R in bytes. (b) Calculate the blocking factor bfr and the number of file blocks b assuming an unspanned organization. (c) Calculate the average time it takes to find a record by doing a linear search on the file if (i) the file blocks are stored contiguously and double buffering is used, and (ii) the file blocks are not stored contiguously. (d) Assume the file is ordered by SSN; calculate the time it takes to search for a record given its SSN value by doing a binary search.
A database backup schedule consists of weekly full backups performed on Saturday at 12:00 a.m. and daily differential backups also performed at 12:00 a.m. If the database is restored on Tuesday afternoon, which of the following is the number of individual backups that would need to be applied to complete the database recovery?
A. 1 B. 2 C. 3 D. 4
Bert is considering the use of an infrastructure as a service cloud computing partner to provide virtual servers. Which one of the following would be a vendor responsibility in this scenario?
A. Maintaining the hypervisor B. Managing operating system security settings C. Maintaining the host firewall D. Configuring server access control
In a network there are generally two main causes for systems being vulnerable: software or hardware ________ and poor ________ practices.
A. misconfiguration / programming B. social engineering / hiring C. spoofing / management D. development / policy