1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
2 years ago
6

Discuss the advantages and disadvantages of supporting links to files that cross mount points (that is, the file link refers to

a file that is stored in a different volume).
Computers and Technology
1 answer:
Rudiy272 years ago
3 0

Advantage - greater transparency; user doesn't need to be aware of mount points / link creation

Disadvantage - file system containing the link may be mounted while the file system containing the target file may not be; resulting in a dead link

You might be interested in
Which statement regarding hard drives is incorrect?
Veseljchak [2.6K]

Answer: I think the answer is

c. solid state drives are less expensive than magnetic hard drives

Explanation:

4 0
3 years ago
Read 2 more answers
10.A chlorine ion (Cl-) would most likely bond with _____.<br><br> A.Cl-<br> B.Mg<br> C.K+<br> D.O
andrezito [222]
B. Mg
Hope this helps ☺
6 0
3 years ago
Code used when creating a hyperlink to a specific part of the same page.
mars1129 [50]

Answer:

Give The Object Or Text You'd Like To Link To A Name.

Take That Name That You've Chosen, And  Then Now Insert It To An Opening HTML Anchor Link Tag.

Place That Complete Opening <a> Tag From Before The Text Or Object You Want To Link It To, Then Now Add A Closing </a> tag after.

(Hope this is correct and hope this helped. Sorry if I'm wrong and you get this wrong)

5 0
3 years ago
Cindy wants to send threat information via a standardized protocol specifically designed to exchange cyber threat information. W
Dahasolnce [82]

Cindy  can choose to exchange cyber threat information in the given scenario via the use of TAXII.

<h3>What is standardized protocol?</h3>

Standardized protocols is known to be the one that gives room for people or clients to communicate with any given window manager.

Note that in the above case, Cindy  can choose to exchange cyber threat information in the given scenario via the use of TAXII.

Learn more about standardized protocol from

brainly.com/question/14672166

#SPJ1

8 0
2 years ago
List 5 peripheral device and state their function<br>​
JulsSmile [24]

Answer:

Printer - displays text or pictures on paper

Scanner - creates a digital representation of paper

Optical Mouse - translates muscle movements onto a cursor

External hard drive - used for storing files

VOIP phone - places phone calls using the VOIP protocol

6 0
3 years ago
Other questions:
  • Which part of project management involves determining the overall work? Breakdown Incomes Scope Time
    15·1 answer
  • PLEASE HELP!!! History abounds with instances in which the work of scientists and artists were affected by the political, religi
    9·1 answer
  • Caleb is a big fan of science fiction, so he loves picturing the ________ gland as the captain of his personal starship, pulling
    9·1 answer
  • The ____________________ chip handles the functions of the keyboard controller.
    12·1 answer
  • When evaluating the validity of a website beyond its URL, you can practice the "rule of 3" which means
    11·2 answers
  • Explain the functions of a VDU?
    6·1 answer
  • Which step should Rupa take?
    15·1 answer
  • When would you insert a merge field?
    10·2 answers
  • Please Complete in Java a. Create a class named Book that has 5 fields variables: a stock number, author, title, price, and numb
    10·1 answer
  • Dunbar's number, 150, refers to the number of:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!