1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tasya [4]
3 years ago
6

A linear representation of a hierarchical file directory is known as what?

Computers and Technology
1 answer:
MissTica3 years ago
5 0
It is known as a directory path
You might be interested in
Assuming there are 100 million households in the US, and that each household has two HDTVs, and that each TV is used to watch 4
BartSMP [9]

Answer:

400 Tb/s (400 ×  10¹² b/s )

Explanation:

Given that :

the number of household in US = 100 million

the number of HDTVs per house is = 2

the rate of the video streaming = 2 Mb/s

the watch hour = 4 hours of video per day

We equally know that :

I Mb = 10⁶ bits

The Total peak aggregate data rate delivered to all homes provided every household is watching both the tvs simultaneously =  Total bits streamed × number of households × number of HDTVs

= (100 ×  10⁶)×2 (2× 10⁶) b/s

= 400 ×  10¹² b/s

= 400 Tb/s (400 ×  10¹² b/s )

3 0
3 years ago
Hey guys, I don’t have a problem for you but If anyone knows do you still pass your grade level if you failed 1 class in the las
Hoochie [10]

Answer:

I think you have to retake it:():

3 0
2 years ago
Read 2 more answers
Anyone have any website ideas I could use for my computing website project? Thank you.
nlexa [21]
Yes like keynote yup keynote I use a lot of PowerPoints on keynote Yk
8 0
2 years ago
Read 2 more answers
True or False: You cannot change the default margin size for Word documents.  
Veronika [31]
The answer is false because you can change the margin size on words documents.
8 0
3 years ago
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and
Vladimir [108]

Answer:

The specific type of tools that can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security issues are:

1. Arachni

2. Grabber

3. Iron wasp

4. Nogotofail

5. SonarQube

6. SQLMap

7. W3af

8. Wapiti

9. Wfuzz

10. ZedAttack Proxy Zap

Explanation:

The testing tool is capable of uncovering a number of vulnerabilities, to scan small web applications, to uncover over 25 types of web application vulnerabilities, to detect TLS/SSL vulnerabilities and misconfigurations, to measure the source code quality of a web application, to detect and utilize SQL injection vulnerability in a website’s database, to find over 200 types of security issues in web applications, to check web applications for security vulnerabilities.

The security testing tool supports command-line access for advanced users can also be used to intercept a proxy for manually testing a webpage.

5 0
3 years ago
Other questions:
  • Your grandmother was an established artist and left you several original paintings after she died. Which of these statements is
    6·1 answer
  • Which of the following is a category of social media?
    8·2 answers
  • Write a method reverse( ) for OurLinkedList class. The method should return a new OurLinkedList object that is the reverse of th
    8·1 answer
  • The part of the computer that contains the brain, or central processing unit, is also known as the
    15·1 answer
  • IF YOU PLAY SURVIV&gt;IO WITH ME RIGHT NOW I WILL GIVE YOU BRAINLIEST<br> AND IM NOT KAPPING
    5·1 answer
  • Write a method, findMax(), that takes in two integers and returns the largest value. Ex: If the program input is: 4 2 the method
    8·1 answer
  • What are the columns in a Microsoft Access table called?
    15·1 answer
  • PLS REPLY ASAP WILL MARK BRAINLIEST
    5·2 answers
  • What form of contacts can be shared in Outlook 2016?
    9·2 answers
  • What is output by the following code?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!