A pointer to a file is called

A. an inode
B. a link


B. a link

Computer Science & Information Technology

You might also like to view...

Key sizes of __________ or less are now considered to be inadequate.

A) ?128 bits ? B) ?32 bits ? C) ?16 bits ? D) ?64 bits

Computer Science & Information Technology

Why would a programmer choose to use protected class members and not private class members?

A. In case specific variables or functions are needed by a derived class. B. So you can get any and all data from parent class. C. You should always use private class members for data security. D. None of the above.

Computer Science & Information Technology

Full control is a type of NTFS permission that might be enabled within an access control list

Indicate whether the statement is true or false

Computer Science & Information Technology

A ____ is a collection of requirements specific to the system or procedure that must be met by everyone.

A. code of ethics B. guideline C. standard D. policy

Computer Science & Information Technology