A __________ is a file of indexes to the other files it points to.

a. file table
b. directory
c. page table
d. segment table


b. directory

Computer Science & Information Technology

You might also like to view...

Text files can be imported into Excel workbooks

Indicate whether the statement is true or false

Computer Science & Information Technology

The listing of the nodes produced by the preorder traversal of a binary tree is called the ____.

A. preorder sequence B. postorder sequence C. inorder sequence D. variable sequence

Computer Science & Information Technology

Which type of attack uses hundreds, thousands, or even millions of computers under the control of a single operator to launch a coordinated attack?

A. DDoS B. Smurf attack C. Phishing D. DHCP snooping

Computer Science & Information Technology

You are required to implement a WiFi hot-spot for the public. Which of the following should be used for secure access?

A. WEP and TKIP B. WPA2 and AES C. WPA and static IPs D. WPA2 and MAC filtering

Computer Science & Information Technology