Subfolders are also called ________
A) the File Explorer
B) Home folders
C) specialized folders
D) children
Ans: D) children
Computer Science & Information Technology
You might also like to view...
The relationship of the digital forensics professional with the rest of the cybersecurity roles is typically in an internal one.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
?_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.
A. ?Scalability B. ?Compatibility C. ?Cardinality D. ?Functionality
Computer Science & Information Technology
A(n) ____ can be viewed as a sequence of steps that accomplishes a single task.
A. procedure B. transaction C. program D. method
Computer Science & Information Technology
A _____ is the line that defines the perimeter of a table.
A. ?table ruler B. ?table border C. ?table mark D. ?table frame
Computer Science & Information Technology