As long as users refer to files in the ____ directory, they can access the files without entering the absolute filename.
A. root
B. main
C. home
D. working
Answer: D
You might also like to view...
Which statement is false?
a. A DELETE statement removes rows from a table. b. A DELETE statement must specify the table from which to delete. c. A DELETE statement starts with the keyword DELETE. d. A WHERE clause must be present in a DELETE statement.
Big-oh notation for a time complexity can be misleading when:
A. it is not the best possible big-oh time complexity that applies correctly to the algorithm B. the time complexity of the algorithm does not vary, and theta notation would work C. the worst case time complexity of the algorithm is far worse than its best case and average case time complexities, and all of these are known in theta notation D. All of the above
A professional who specializes in analyzing and designing business systems is called a(n) ____.
a. systems analyst b. project manager c. individual systems developer d. programmer
WPA2 uses the Advanced Encryption Standard (AES) for data encryption but does not support IEEE 802.1x authentication or PSK technology.
Answer the following statement true (T) or false (F)