1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
4 years ago
3

The index used by the OS to manage computer files is called _____.

Computers and Technology
2 answers:
alexandr1967 [171]4 years ago
7 0
The answer is B) FAT.
alexira [117]4 years ago
3 0

hey bud it's your ole pal paps

sans and i came to help by giving some tips this will surely help and jolt the memory.

Keeping track of these files is a big job. To perform this task, the OS makes an index of all the files stored on the computer. This index is called a File Allocation Table (FAT). The OS updates the FAT every time a file is created, renamed, moved, or deleted.

-paps & sans

You might be interested in
Edmentum Question- Consumer and Credit Loans
Alina [70]

Answer:

D, if the debtor fails the means test

Explanation:

i took the test on platos and got it right

7 0
3 years ago
____ is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise moni
insens350 [35]

Answer:

Computer monitoring software

Explanation:

Computer monitoring software is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise monitoring someone’s computer activity.

4 0
3 years ago
Read 2 more answers
Consider the following environment with a local dns caching resolver and a set of authoritative dns name servers
Schach [20]

Answer:

Normally in a DNS server, There are no packet losses•All processing delays are 0 ms

Explanation:

If any packet lost in DNS then lost in the connection information will be displayed in prompt. Once the packet is lost then data is lost. So if the packet is lost then data communications are lost or the receiver will receive data packet in a lost manner, it is useless.

To connect in windows normally it will take 90 ms for re-establish connection it normally delays the time in windows. So that end-user he or she for best performance ping the host or gateway in dos mode so that connection or communication will not be lost. If any packet is dropped DNS will get sent the packet from sender to receiver and the ping rate will more in the network traffics.

7 0
4 years ago
Why is the Physical Link at Layer 1 of the OSI?
nata0808 [166]
Data is checked to make sure it is complete

<span>Layer 1, provides physical connections for transmission and performs the electrical encoding of data. This layer transforms bits to electrical signals.
The lowest, or first, layer of the OSI model. Protocols in the physical layer generate and detect signals so as to transmit and receive data over a network medium. These protocols also set the data transmission rate and monitor data error rates, but do not provide error correction.</span>


3 0
4 years ago
6.23 LAB: Convert to binary - functions Instructor note: This is a lab from a previous chapter that now requires the use of a fu
Kitty [74]

Answer:

The program in Python is as follows:

import math

def integer_to_reverse_binary(integer_value):

   remainder = ""

   while integer_value>=1:

       remainder+=str(integer_value % 2)

       integer_value=math.floor(integer_value/2)

   reverse_string(remainder)

def reverse_string(input_string):

   binaryOutput=""

   for i in range(len(input_string)-1,-1,-1):

       binaryOutput = binaryOutput + input_string[i]

   print(binaryOutput)

integer_value = int(input("Enter a Number : "))

integer_to_reverse_binary(integer_value)

Explanation:

This imports the math module

import math

This defines the integer_to_reverse_binary function

def integer_to_reverse_binary(integer_value):

This initializes the remainder to an empty string

   remainder = ""

This loop is repeated while the integer input is greater than or equal to 1

   while integer_value>=1:

This calculates the remainder after the integer value is divided by 2

       remainder+=str(integer_value % 2)

This gets the floor division of the integer input by 2

       integer_value=math.floor(integer_value/2)

This passes the remainder to the reverse_string function

   reverse_string(remainder)

The reverse_string function begins here

def reverse_string(input_string):

This initializes the binaryOutput to an empty string

   binaryOutput=""

This iterates through the input string i.e. the string of the remainders

   for i in range(len(input_string)-1,-1,-1):

This reverses the input string

       binaryOutput = binaryOutput + input_string[i]

This prints the binary output

   print(binaryOutput)

<u>The main begins here</u>

This gets input for integer_value

integer_value = int(input("Enter a Number : "))

This passes the integer value to the integer_to_reverse_binary function

integer_to_reverse_binary(integer_value)

3 0
3 years ago
Other questions:
  • Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
    6·1 answer
  • Write a balanced half-reaction for the oxidation of manganese ion Mn+2 to permanganate ion MnO−4 in acidic aqueous solution. Be
    12·1 answer
  • The stack ADT may be implemented with
    13·1 answer
  • In Shoreville, the last low tide was at 12:00 a.m. About what time will the next high tide occur?
    8·2 answers
  • Write a program that turns a 32-bit numeric value (e.g., 0xFFFFh) and converts it to a byte array such that it can be printed to
    10·1 answer
  • Rebecca is an interior designer. What is her job role? need this asap
    9·1 answer
  • 5. Compare the telephone network and the internet. What are the similarities? What are the differences?
    12·1 answer
  • Can any one help me please with my computer science hwk :)
    11·1 answer
  • susan wrote the recursive formula for the sequence represented by the exploit formula An=3+2n. put an C net to any correct state
    13·1 answer
  • _________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!