A __________ is a file of indexes to the other files it points to.
a. file table
b. directory
c. page table
d. segment table
b. directory
You might also like to view...
Text files can be imported into Excel workbooks
Indicate whether the statement is true or false
The listing of the nodes produced by the preorder traversal of a binary tree is called the ____.
A. preorder sequence B. postorder sequence C. inorder sequence D. variable sequence
Which type of attack uses hundreds, thousands, or even millions of computers under the control of a single operator to launch a coordinated attack?
A. DDoS B. Smurf attack C. Phishing D. DHCP snooping
You are required to implement a WiFi hot-spot for the public. Which of the following should be used for secure access?
A. WEP and TKIP B. WPA2 and AES C. WPA and static IPs D. WPA2 and MAC filtering