1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
My name is Ann [436]
3 years ago
9

The _____ path the name of the fire for the page and any directories or subdirectories​

Computers and Technology
1 answer:
Scorpion4ik [409]3 years ago
5 0

Answer:

1. An absolute path name begins at the _____________

a) leaf

b) stem

c) current directory

d) root

View Answer

Answer: d

You might be interested in
What is the purpose of a system call in an operating system?
ikadub [295]

Answer:

 The system call is the programming way for executing the requesting the services in the program from kernel in the particular operating system.

The main purpose of the system call in the operating system is that it basically provide the different types of the services to the users by using the API (Application program interface) system.

It basically provide the interface for allowing the users to request the services between the operating system and a processor. In the linux there are basically three types of system call are as follows:

  • Fork
  • Waitpid
  • Exist

6 0
3 years ago
What keys on the keyboard have the ability to move the cursor around on a window?
madreJ [45]

Answer:

Press the Windows key on your keyboard. In the box that appears, type Ease of Access mouse settings and press Enter . In the Mouse Keys section, toggle the switch under Use numeric pad to move mouse around the screen to On. Press Alt + F4 to exit this menu.

8 0
3 years ago
Explain why much of social media marketing is trial and error.
Ivahew [28]
The first thing that entrepreneurs need to realize is that the process and framework for making social media marketing work are different from traditional marketing, and trial and error certainly doesn’t work. Ric Dragon, an expert in online marketing, in his new book “Social Marketology<span>,” outlined the best set of steps I have seen so far for the new world:</span>
7 0
3 years ago
Given two ArrayLists of sorted strings (alphabetically ascending), write down a method to merge these sorted strings’ ArrayLists
Elena-2011 [213]

Answer:

see explaination

Explanation:

import java.util.ArrayList;

import java.util.Arrays;

public class Merge {

public static ArrayList<String> mergeList(ArrayList<String> lst1, ArrayList<String> lst2) {

ArrayList<String> result = new ArrayList<String>();

int i = 0, j = 0;

while (i < lst1.size() || j < lst2.size()) {

if (i < lst1.size() && (j >= lst2.size() || lst1.get(i).compareTo(lst2.get(j)) < 0)) {

result.add(lst1.get(i++));

} else {

result.add(lst2.get(j++));

}

}

return result;

}

public static void main(String[] args) {

ArrayList<String> lst1 = new ArrayList<>(Arrays.asList("Austin", "Dallas", "San Fransisco"));

ArrayList<String> lst2 = new ArrayList<>(Arrays.asList("Boston", "Chicago", "Denver", "Seattle"));

System.out.println(mergeList(lst1, lst2));

}

}

8 0
4 years ago
The Quick Search capability is found on which control?
choli [55]

Answer:

backstage view

Explanation:

6 0
3 years ago
Other questions:
  • Generate the requested sets using only set builder notation and the provided sets. Some problems may require you to build one or
    15·1 answer
  • What is virtualization?
    11·2 answers
  • How does violating the SOLID principles make code hard to test?
    5·1 answer
  • Design 3 classes: Computer - Superclass
    11·1 answer
  • Which model represents any process in general?
    6·1 answer
  • You wrote a program to allow to guess a number chosen randomly.
    10·2 answers
  • What are some common uses of Excel?
    10·1 answer
  • There are many reasons to convert to the decimal numbering system. Select the best answer. When checking numeric values in compu
    5·2 answers
  • What are the minimum number of bits an address bus must have in a byte addressable memory system containing only 4 KiB of memory
    8·1 answer
  • It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!