Subfolders are also called ________

A) the File Explorer
B) Home folders
C) specialized folders
D) children


Ans: D) children

Computer Science & Information Technology

You might also like to view...

The relationship of the digital forensics professional with the rest of the cybersecurity roles is typically in an internal one.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

?_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

A. ?Scalability B. ?Compatibility C. ?Cardinality D. ?Functionality

Computer Science & Information Technology

A(n) ____ can be viewed as a sequence of steps that accomplishes a single task.

A. procedure B. transaction C. program D. method

Computer Science & Information Technology

A _____ is the line that defines the perimeter of a table.

A. ?table ruler B. ?table border C. ?table mark D. ?table frame

Computer Science & Information Technology