Programs are identified by name in a disk’s __________.

a. IOCS
b. directory
c. file system
d. they aren't


b. directory

Computer Science & Information Technology

You might also like to view...

_________ involves maneuvering in a car with a portable device looking for unsecured Wi-Fi networks to connect to. A. War driving B. Wi-Fi piggybacking C. Cyber steering D. Virtual sponging

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The SelectedIndex property of a ComboBox returns the value of the list item that was selected by the user.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

COGNITIVE ASSESSMENT What is the purpose of an Internet Protocol address (IP address)?

A. It specifies whether a computer is using a broadband network or a direct-dial network. B. It differentiates between a server computer and a client computer and contains codes to identify whether the computer can send data or receive data. C. It contains the protocol schema used to identify whether the computer is on a wired or wireless network. D. It uniquely identifies the location of each computer or device connected to the Internet.

Computer Science & Information Technology

Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?

A. Network router B. Personal firewall C. Hardware that uses NAT (network address translation) D. All of the above

Computer Science & Information Technology