The __________ incorporates routines that allow the user or programmer to create, delete, modify, and manipulate files logically, by name.

a. BIOS
b. file system
c. PICOS
d. user interface


b. file system

Computer Science & Information Technology

You might also like to view...

Perhaps an employee no longer works at the salon and there are dozens of future appointments that need to be changed to a different employee's name. You could create a(n) ________ that changes the name of the employee for all future appointments from the employee who left to the a employee

A) make table query B) delete query C) append query D) update query

Computer Science & Information Technology

Which of these is a repository of security-related documentation and also sponsors a number of security research projects?

a. Computer Emergency Response Team b. F-Secure c. SANS Institute d. Microsoft Security Advisor

Computer Science & Information Technology

The __________ command is used to remove unwanted portions of a picture inserted in a document.

A. Cut B. Compress Picture C. Sizing D. Crop

Computer Science & Information Technology

Which type of web developer role focuses on aspects that are visible to the website visitor, such as design. 

A. full-stack B. front-end C. back-end D. All of the above

Computer Science & Information Technology