1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivann1987 [24]
3 years ago
5

What is the top folder of the file tree called

Computers and Technology
2 answers:
White raven [17]3 years ago
4 0

Question: what is the top folder of the file tree called

Answer:  is called the root directory.

Explanation: file Tree is an input filter which renders a list of files

question answered by

(jacemorris04)


m_a_m_a [10]3 years ago
3 0
The root directory, or root folder, is the top-level directory of a file system.
You might be interested in
Next, Nate wants to add a date placeholder to his template. First, he places his insertion point a line before the company place
Debora [2.8K]

Explanation:

When using programs such as Microsoft and other similar products, things have been made so easy, with so many features, that you can make your document look good and interesting. For the case of Nate, he wants to add a date placeholder to his template, and the best way to do this is simply to click on the INSERT tab on the ribbon.

5 0
4 years ago
In linux ext file systems, a files data block addresses/numbers are stored in
MariettaO [177]
I think the answer is the superblock
4 0
3 years ago
Under what circumstances would it be appropriate to use the sentence method of note taking, and what are the advantages and disa
frozen [14]
<span>The sentence method is writing every new thought as an individual sentence. The advantage of this is that it is much easier to go back and find where a specific topic's notes are as opposed to having to read through a paragraph of notes. The disadvantage of it is that it's harder to convey a deeper meaning when every thought is written in its own line.</span>
3 0
3 years ago
Read 2 more answers
In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
jenyasd209 [6]
Social engineering is your answer
7 0
3 years ago
. What is suboptimization?
Vera_Pavlovna [14]

Answer: Suboptimization is referred to as a term that has been approved for common policy mistake. It usually refers to the practice of concentrating on a single component of a whole and thus making changes which are intended towards improving that component and also ignoring its effects on other components.

3 0
3 years ago
Other questions:
  • What type of program would use to create a personal budget?
    14·1 answer
  • …………………..is made upof plastic or glass fibers that transmit data at very fastspeeds.
    10·1 answer
  • What is the name of small programs stored on the hard drive that tell the computer how to communicate with a specific hardware d
    5·1 answer
  • 3. Of the following pieces of information in a document, for which would you most likely insert a mail merge field? A. First nam
    13·2 answers
  • Which is a value of the Scrum Manifesto?
    9·1 answer
  • Which of the following is not true about search engine advertising?
    15·1 answer
  • Greg is the network administrator for a large stadium that hosts many events throughout the course of the year. They equip usher
    7·1 answer
  • I'll mark you the brainlest please help
    14·2 answers
  • You are the security analyst for your organization and have discovered evidence that someone is attempting to brute-force the ro
    11·1 answer
  • You can use a(n) ______________to store large amounts of customer data for a website.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!