The cipher command works on _______________.
A. attributes
B. directories
C. disk drives
D. tables
Answer: B
Computer Science & Information Technology
You might also like to view...
An enterprise technician is tasked to implement a disk array that will host continuous disk-to-disk replication. Which of the following storage types should be selected for maximum performance?
A. USB B. SCSI C. SATA D. SAS
Computer Science & Information Technology
When would you use a linked list over an array or a dynamic array?
a. when you know the maximum size at compile time b. when you know the maximum size at run-time c. when you do not know the maximum size d. when you need to access any item quickly
Computer Science & Information Technology