1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
3 years ago
14

pWhat macOS system application tracks each block on a volume to determine which blocks are in use and which ones are available t

o receive data?/p Group of answer choices The Master Directory Block Then Extents Overflow File The Volume Bitmap The Volume Control Block
Computers and Technology
1 answer:
Anna [14]3 years ago
5 0

Answer:

The answer is "The Volume Bitmap".

Explanation:

It is a hidden file, that records the available space and it can't accessible on the drive. It accelerates the process of publishing new documents onto the database by keeping the device from testing the position of each file, and the wrong option can be described as follows:

  • The MDB is used to define the data volume, that's why it is wrong.
  • The volume control block is used to maintain the system heap, that's why it is wrong.
You might be interested in
Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
il63 [147K]

Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.

Explanation:

Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.

Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.

7 0
3 years ago
What command in windows re gives you the opportunity to manage partitions and volumes installed on the system?
KIM [24]
Diskpart command might be the answer
3 0
3 years ago
Write a program that asks the user to enter five different, integer numbers. The program then reports the largest number and the
Akimi4 [234]

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

  int minn=INT_MAX;

   int maxx=INT_MIN;

   int n1,n2,n3,n4,n5;

   cout<<"enter five Numbers:";

   //read 5 Numbers

   cin>>n1>>n2>>n3>>n4>>n5;

   // find maximum

   if(n1>maxx)

    maxx=n1;

    if(n2>maxx)

    maxx=n2;

    if(n3>maxx)

    maxx=n3;

    if(n4>maxx)

    maxx=n4;

    if(n5>maxx)

    maxx=n5;

   // find minimum

   if(n1<minn)

    minn=n1;

    if(n2<minn)

    minn=n2;

    if(n3<minn)

    minn=n3;

    if(n4<minn)

    minn=n4;

    if(n5<minn)

    minn=n5;

   // print maximum and minimum

   cout<<"maximum of five numbers is: "<<maxx<<endl;

   cout<<"minimum of five numbers is: "<<minn<<endl;

return 0;

}

Explanation:

Declare two variables "minn" & "maxx" and initialize them with INT_MAX and INT_MIN respectively.Then read the five number from user and compare it with "minn" & "maxx" ,if input is greater than "maxx" then update "maxx" or if input is less than "minn" then update the "minn". After all the inputs, "minn" will have smallest and "maxx" will have largest value.

enter five Numbers:5 78 43 55 12

maximum of five numbers is: 78

minimum of five numbers is: 5

4 0
3 years ago
Read the following scenario:
Fofino [41]

Answer:

I think it is the second answer choice honestly

Explanation:

I'm gonna say either the first one or second one because the word film has something to with behind the scenes work not being an actor.

8 0
3 years ago
Read 2 more answers
Can someone help me i need to write something for cyber bullying
snow_tiger [21]

cyber bullying is when there is a minor on both ends and when a person has the time to go online to pick on you


3 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is an extension of the fill pattern Sunday,Tuesday?
    10·2 answers
  • which resource do programmers sometimes have to refer to and use during planning the logical steps of the solution
    15·2 answers
  • 1. A thesaurus is best used to _____________.
    12·1 answer
  • How is an orthographic drawing similar or different from an isometric drawing
    12·1 answer
  • Please answer these questions! Will mark Brainliest!!
    7·1 answer
  • Which EMC product provides a solution for block-level storage virtualization and data mobility?
    7·1 answer
  • A ? is the desired value where a process should be maintained. The value may be manually set, automatically set, or programmed.
    13·1 answer
  • Once we have reached complete efficiency in the third part of the LRAS Curve, what occurs?
    10·1 answer
  • what are examples of conditional formatting tools? check all that apply. color scales, icon sets,data bars,cell styles,themes
    8·1 answer
  • What does computer graphics mean?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!