The ____ directory contains device files representing each hardware component in the system.

A. /bin/
B. /dev/
C. /lib/
D. /etc/


Answer: B

Computer Science & Information Technology

You might also like to view...

The types of functions that may be used to produce an authenticator are grouped into three classes: hash function, message authentication code, and ___________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Case EX 3-1Vanessa is learning how to split a worksheet window.What should Vanessa do to start the process of splitting a window horizontally?

A. Select a row B. Select a column C. Select a cell D. Select a worksheet

Computer Science & Information Technology

Case PPT 4-1Ashley works in the Human Resources department of a large company. She is creating a slide show to inform employees about the company's new "green" policies. Ashley created a column chart to show the growth of the company's use of recycled products, but now she thinks a line chart would better. Which command should she use to solve her problem?

A. Quick Layout button B. Change Chart Type button C. Edit Data button D. Delete it and start over

Computer Science & Information Technology

To display the entire entry for a calculated field, select the column in the Field row, right-click to display the shortcut menu, and then click ____.

A. Enlarge B. Resize C. Magnify D. Zoom

Computer Science & Information Technology