1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
4 years ago
5

In fat 12, how many bytes does each directory-entry use to define a file or subdirectory in a directory?

Computers and Technology
1 answer:
Paladinen [302]4 years ago
6 0
If I've got it correct, in FAT12, each directory-entry use 2 bytes to define a fire or subdirectory in a directory. It's a field that called the First Logical Cluster that is needed to specify where the file or subdirectory begins. Is the value of the First Logical Cluster is "0", then it refers to the first cluster of the root directory.
You might be interested in
According to the book, if your CPU usage levels are greater than ________ during most of your work session, a faster CPU can gre
Zanzabum

Answer:

90%

Explanation:

3 0
4 years ago
Why did scientists who study weather need more advanced technology? Check all that apply.
kobusy [5.1K]

Answer:

All options are correct.

Explanation:

All options apply to the question because they all need technology for development and improvement. Scientists needed to develop more technologies in order to attend all their necessities, such as anticipating weather changes, forecasting weather previously, predicting weather behaviour in different places and in one specific place, accounting for reasons and natural resources related to weather changes, and much more. Therefore, technology provides faster and more consistent data for all these informations needed, since all technology tools to study weather were developed according to their specific needs.

4 0
3 years ago
Read 2 more answers
Which of the following are breach prevention best practices?Access only the minimum amount of PHI/personally identifiable inform
Rudiy27

Answer:

All of this above.

Explanation:

All the mentioned practices can be use to prevent breaches.

6 0
3 years ago
Which two graphs best represent the motion of an object falling freely?
larisa [96]
The graph would have to be pointing completely down to be falling freely.
4 0
3 years ago
Which of the follow is an example of an integer?<br> "1.091"<br> "number"<br> 15<br> name
UkoKoshka [18]

Answer:

The answer is 15

Explanation:

A integer is a whole number, the only wholenumber present is 15

Hope this helps :)

8 0
2 years ago
Other questions:
  • Write the definition of a method printarray, which has one parameter , an array of int s. the method does not return a value . t
    10·1 answer
  • You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wa
    9·1 answer
  • Which of these is not the correct method for moving text in a document in Word 2016?
    14·2 answers
  • Which computer company was named after an orchard? dell, apple, or ibm
    11·1 answer
  • Which of the following website is arguably considered the best site to search for scholarships
    8·2 answers
  • How many bits does it take to store a 3-minute song using an audio encoding method that samples at the rate of 40,000 bits/secon
    12·1 answer
  • Is a biometric system an input, output, storage or soft device?​
    6·1 answer
  • Why should running your unit test suites not take a long time?A. Unit tests aren't that important, so less time should be spent
    5·1 answer
  • What is the difference between posting and transfer in ICT please I need the answer before TMR​
    9·1 answer
  • How Powerpoint is useful in education aspect?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!