1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kiruha [24]
3 years ago
9

Although a user directory is treated as a file, it is flagged to indicate to the file manager that this file is really a ____ wh

ose records are filenames that point to files.
Computers and Technology
1 answer:
mart [117]3 years ago
3 0
Although a user directory is treated as a file, it is flagged to indicate to the file manager that this file is really a subdirectory whose records are filenames that point to files.
You might be interested in
Olivia wants to change some settings in Outlook. What are the steps she will use to get to that function? open Outlook → File →
Rainbow [258]

Answer:

C.

Explanation:

edg 2020

3 0
3 years ago
Read 2 more answers
Identify the causes of configuration problems. (choose all that apply)
jolli1 [7]

Answer: The computer does not meet minimum requirements of the software program because too much energy gets put in it

Explanation:

Good luck

4 0
3 years ago
Read 2 more answers
How would you use SQL to change a table's structure? What general types of changes are possible? Which commands are used to impl
xz_007 [3.2K]

The SQL is used to change a table's structure by:

The use of the SQL ALTER TABLE command.

<h3>How is it done?</h3>

The SQL ALTER TABLE command is known to  be that which is often used to alter the structure of an existing table.

It is known to help one to be able to add or delete columns, make or destroy indexes, alter the kinds of existing columns, rename columns or the table itself.

Note that  It can also be used to alter the comment for any kind of table and type of the table therein.

Learn more about SQL from

brainly.com/question/25694408

#SPJ1

4 0
2 years ago
Which security testing activity uses tools that scan for services running on systems? reconnaissance penetration testing network
Fiesta28 [93]

Answer:

Network mapping.

Explanation:

Network mapping seems to be the method of mapping the server visibly and rationally in order to determine the relations at mid of the network as well as the not same nodes.

  • Network mapping is the practice of security checking using software to search against services running on networks.
  • Network performance applications and software contains certain network mapping functions that customize the network
7 0
3 years ago
Which is an aspect of structural-level design?
DENIUS [597]
I think it’s D. Sorry if it’s wrong
5 0
3 years ago
Read 2 more answers
Other questions:
  • Does anyone watch The Office?
    14·1 answer
  • Texture fills are available to add as a slide background true or false
    7·2 answers
  • Write a program that reads a target string from the keyboard and then another sentence string from the keyboard.
    10·1 answer
  • Write a program to read data from a file named problem 2. ext. This file has three exams data (floating point data) in three col
    11·1 answer
  • ________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
    12·1 answer
  • What is a characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications amon
    9·1 answer
  • You should always assign the Needs Met rating before assigning the Page Quality rating, T or F ?
    6·2 answers
  • Which of the following terms refers to the cells that contain values and labels to be graphed in the chart?.
    6·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
  • The scope of a temporary table is limited to what?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!