Which of the following is not utility software?

A. F- DISK
B. CHK-DISK
C. DOS-DISK
D. SCAN-DISK


Ans: A. F- DISK

Computer Science & Information Technology

You might also like to view...

The term __________ is commonly used to refer to a string that is part of another string.

a. nested string b. literal c. substring d. delimiter

Computer Science & Information Technology

Which of the following is a difference between a Norton firewall and a McAfee personal firewall?

a. A Norton firewall is easy to use whereas a McAfee personal firewall is not easy to use. b. A Norton firewall can block outbound traffic whereas a McAfee personal firewall cannot block outbound traffic. c. A Norton firewall can allows you to scan your system for vulnerabilities whereas a McAfee personal firewall does not have this option. d. A Norton firewall is free whereas a McAfee personal firewall is a commercial product.

Computer Science & Information Technology

A principal element of an identity management system is _______.

A. workflow automation B. delegated administration C. authentication D. all of the above

Computer Science & Information Technology

When Tiger is operating with a failed disk or cub, secondary data blocks are used in place of missing primaries. Secondary blocks are n times smaller than primaries (where n is the decluster factor), how does the system accommodate this variability in block size?

What will be an ideal response?

Computer Science & Information Technology