1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
3 years ago
10

Many computer users and some operating systems call subdirectories ____.

Computers and Technology
1 answer:
WITCHER [35]3 years ago
7 0
A subfolder or a folder.

A subfolder or a subdirectory is a directory contained within another directory. It is a subfolder of another folder. Thus, a subfolder or subdirectories are two words that have more or less the same meaning. Example, all other folders contained in the root directory of the main directory in a file system is the subdirectory of the root directory.



You might be interested in
What is the name of a statement written to retrieve specific data from a table?
Shkiper50 [21]
The answer is b.record
4 0
3 years ago
Which of the following data recording procedures is best used for behaviors that have a clear ending and beginning, do not occur
nordsb [41]

Answer:

a. partial interval

Explanation:

Partial Interval data recording method of data collection involves recording whether an event occurs or does not during a defined interval.

It is different than <em>whole interval</em> data recording because partial interval doesn't occur throughout the entire interval.

In partial interval recording, <em>discrete behaviors</em> are observed. For example, this kind of behavior can be a person swearing or hitting to someone, a student participating in class discussions etc.

8 0
3 years ago
Explain in your own words how remote-access Trojans (RATs) work. How can these be used by attackers? How would a network adminis
LUCKY_DIMON [66]

Answer: Remote Access Trojans (RATs) is the malware that is used by the hackers to attack the computer and operating system remotely.The working of RATs is done by download the malware and executing it to create a server .After the server is created ,hacker sends this server along with a crypter to eliminate the antivirus program's function present in the user's system.

Thus, RAT gets invoked in the system of the user and the hacker can control the user's system .Attacker can hack the complete functioning of the user's system and can steal, destroy ,execute etc any confidential data and application.

The user or the network administrator can get to know about the RAT's activity by steps like checking the open port, checking the activities through Task Manager of Windows, observing any unusual activity and appearance of the display screen etc.

4 0
3 years ago
Identify a security context of interest to you. Within this context, what constitutes a direct benefit of a risk management stra
belka [17]

Here,the Preparedness of the National(National Preparedness), that which gives a description of mission areas and also provide a framework for the consideration of management of risk.

It gives an illustration of the relationship of the National preparedness mission elements of risk.

Activities aimed at prevention are also associated with the efforts for the addressing of protection efforts generally address vulnerabilities recovery efforts.

However,we see that efforts of mitigation transcends vulnerability and also consequence spectrum.

Here,the PPD-8 mission areas are central,and this is to enhance national preparedness and also for infrastructure risk management activities.

When these are developed,they contribute to the achievement of resilient and secure critical infrastructure,and these critical infrastructure risks are however seen as part of setting capability targets.

THREAT AND HAZARD IDENTIFICATION AND RISK ASSESSMENT.

"THIRA" gives a provision of an approach for the identification and assessment of risks and also the associated impacts.

Determination that THIRA process has been completed by jurisdiction,then you consider the results when undergoing the assessment of risks to critical infrastructure.

5 0
3 years ago
Explain why there are fundamental ideas of software engineering that apply to all types of software systems.
olasank [31]

Solution:

Because of all software systems have common quality attributes, including  

Fundamental software engineering activities.  The four basic process activities of specification, development, validation and evolution are organized differently in different development processes.  The software is implemented either by developing a program or programs or by configuring an application system. Such that at they (Software engineer) have been made keeping in mind project development. They hence, apply to all software systems and even non software systems. They are the fundamentals for any kind of project development.

Thus this is the required answer..


5 0
3 years ago
Other questions:
  • Define the term entity and give an example of an entity .
    10·1 answer
  • Is using abbreviations and symbols in social media a problem? Why or why not?
    11·1 answer
  • When you receive five job offers what does it mean
    9·1 answer
  • Which view in file explorer can use to sort files by column heading
    8·1 answer
  • Susan needs to use a lookup function to find an exact match of an inventory item, so she will set the range_lookup value to ____
    9·1 answer
  • To all paladins players out there!!!!!
    14·1 answer
  • Which of the following reflects the order of operations
    10·2 answers
  • 1. Assume that in an implementation of the RSA cryptosystem one modular squar- ing takes 75% of the time of a modular multiplica
    15·1 answer
  • Boolean logic deals with statements having one of _____ values.
    13·1 answer
  • Which of the following file formats allows you to share and save documents
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!