Sign In
Ask Question
Lilly Pope
Computers & Technology
Identify the features of a tree topology.
1: Single cable.
2: Combination of the Star and bus topologies.
3: Data travels in circular pattern from one computer to another.
4: It is an ideal topology if the computers are located in groups.
Answer
Answers (2)
Oscar Hull
Computers & Technology
Which variable captures the fact that a person is spontaneous or flexible? A. senses B. judgment C. perceptiveness D. feeling E. intuition
Answer
Answers (2)
Olive
Computers & Technology
A prefix us a part of a word that
Answer
Answers (1)
Edwards
Computers & Technology
This type of technology does not come with a keyboard or mouse for input
Answer
Answers (2)
Isla Hood
Computers & Technology
Mr. Stevens is the principal of a high school. Why might he want to export data from a database of students' exam scores?
to create a presentation using other software on how students' scores have changed throughout a semester
to view the student data in a new database
to query the database and sort students into groups according to their scores
to append additional student records to the database
Answer
Answers (2)
Jeffery
Computers & Technology
For any two documents x and z, define k (x, z) to equal the number of unique words that occur in both x and z (i. e., the size of the intersection of the sets of words in the two documents). Is this function a kernel?
Answer
Answers (1)
Triston Davidson
Computers & Technology
Which Excel file extension stores automated steps for repetitive tasks?
Answer
Answers (2)
Miah Campos
Computers & Technology
Disk requests come in to the disk driver for cylinders 10, 22, 20, 2, 40, 6, and 38, in that order. A seek takes 6 msec per cylinder moved. The arm is initially at cylinder 20.
How much seek time is needed if
a) FCFS
b) SSTF
c) SCAN (elevator)
algorithm is employed?
Answer
Answers (1)
Douglas Burke
Computers & Technology
Which ntfs system file keeps a record of all the clusters that are considered unusable by the file system within that volume? master file table sector file bad cluster file transactional ntfs?
Answer
Answers (1)
Mollie Barrett
Computers & Technology
Evaluate the following expressions.
a. 28 - 3 + 6
b. 6 / 5
c. 3 * 6 / 2 - 15
d. 4 - 6 % 11
e. 37 / 4.0
f. 15 + 18 % 2 - 20 / 6
h. 32 % 12 + 6 - 36 / 5 * 8
i. 5 / 9 * (32.6 - 4.5)
j. 18.0 + 5.0 * 3.0 / 4.0
Answer
Answers (1)
Karissa
Computers & Technology
Alan turing is often regarded as the first programmer true or false
Answer
Answers (1)
Zachery Fitzgerald
Computers & Technology
A main document in a mail merge contains data, such as names and addresses.
Answer
Answers (1)
Jonas Massey
Computers & Technology
What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface?
Answer
Answers (1)
Angelica Salas
Computers & Technology
A set of components on the motherboard that work closely with the processor to control the memory, buses, and peripherals
Answer
Answers (1)
Amethyst
Computers & Technology
Which of the following is a best practice for a strong password policy?
O Users must reuse one of the last five passwords.
O Passwords may be reset only after 30 days.
O Passwords must meet basic complexity requirements.
O Organizational Unit policy should be enforced over Domain policy.
Answer
Answers (1)
More
1
...
99
100
101
102
103
...
Home
»
Computers & Technology
» Page 101
Sign In
Sign Up
Forgot Password?