1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frozen [14]
3 years ago
8

When searching for specific record information, sometimes you see duplicate files with the same name that have different data ru

ns, meaning the file was written to disk more than once on separate occasions.
True or False?
Computers and Technology
1 answer:
mel-nik [20]3 years ago
4 0

Answer:

True is the right answer for the above question.

Explanation:

When a user created a new file with the same name which is already on the disk, then a pop-up window will alert the message to change the name of the file or a computer system replace the old files with a new one. It means that no files exist on the system with the duplicate name.

If it happens in some case then there must be possible that there is one file written in a disk one two places with the different data at the same time. It is because of system error.

The question concept also means the same which is described above. Hence the question is a true statement.

You might be interested in
A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached
Ivan

Answer:

Yes, directory traversal attack.

Explanation:

A website is a collection big web pages hosted on a web server. It contains contents like links and sometimes directory root paths. This a vulnerability attacks an exploit to access the information in a database.

There are two access to a database. One is the authentication process issued for authorised user access and the other is the root access only accessible to the network administrator. It contains paths to directories in the servers.

A directory traversal attack or path attack is done through a web browser by an attacker, who seeks for a weak path link on the public's website and accesses the information in the server.

5 0
3 years ago
A technician is troubleshooting a small network with cable Internet service in which a user is receiving a message in her web br
Irina-Kira [14]

Answer:

True

Explanation:

The technician should first connect a computer directly to the cable modem and attempt to access the Internet, in order to ascertain the message been displayed on the screen. From there, he would know what to do to resolve the issue.

3 0
3 years ago
Why does it still say I am ambitious whenever I have the 5 brainliest and almost 700 points?
Galina-37 [17]
Check below your score it should say something out of 5 you need to get more to get 5/5
8 0
3 years ago
Read 2 more answers
Como realizar un cuadro comprativo?​
Kruka [31]
How to make a comparison chart?
3 0
3 years ago
__________ consists of both physical devices and software, links the various pieces of hardware, and transfers data from one phy
sineoko [7]

Answer:

Communications technology

Explanation:

<u>Communications technology</u> consists of both physical devices and software, links the various pieces of hardware, and transfers data from one physical location to another.

6 0
3 years ago
Other questions:
  • Assume that to_the_power_of is a function that expects two int parameters and returns the value of the first parameter raised to
    11·1 answer
  • In ipv4 addressing, an ip address whose first octet is in the range of 192–223 belongs to a class ____ network.
    15·1 answer
  • Which asset would be helpful in assessing a web or UI designer’s skills?
    13·2 answers
  • You are setting up a RAID system in a server designed for optimum fault tolerance, accuracy, and minimal downtime. Which HDD is
    7·1 answer
  • 9. Alcohol begins to affect your brain
    15·2 answers
  • 2. How is accessing the Internet through a home network and public Wi-Fi similar?​
    15·1 answer
  • Instructions
    15·1 answer
  • Identify a possible IOT (internet of Things) device in a smart kitchen and write a use case for interacting with the software of
    12·1 answer
  • Which hardware component interprets and carries out the instructions contained in the software.
    12·1 answer
  • Kevin, a manager at FitPlus fitness club, owns a website that updates information regarding his fitness club. He created backgro
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!