Sign In
Ask Question
Ayaan Graves
Computers & Technology
What is used to switch to Outline View?
Answer
Answers (1)
Armando Contreras
Computers & Technology
What tool is used to edit pre-existing range names? (check all that apply) ?
Answer
Answers (1)
Candice
Computers & Technology
What type of malware is heavily dependent on a user in order to spread?
Answer
Answers (1)
Kyler Dorsey
Computers & Technology
An automotive engine's camshaft rotates at A. one-quarter the speed of the crankshaft. B. one-half the speed of the crankshaft. C. the same speed as the crankshaft. D. twice the speed of the crankshaft.
Answer
Answers (1)
Raphael Ferguson
Computers & Technology
What is the time period of 1st generation of computer?
Answer
Answers (1)
Danna Jacobs
Computers & Technology
Define a function is_prime that receives an integer argument and returns true if the argument is a prime number and otherwise returns false. (An integer is prime if it is greater than 1 and cannot be divided evenly [with no remainder] other than by itself and one. For example, 15 is not prime because it can be divided by 3 or 5 with no remainder. 13 is prime because only 1 and 13 divide it with no remainder.) This function may be written with a for loop, a while loop or using recursion. Use the up or down arrow keys to change the height.
Answer
Answers (1)
Kristina Garrison
Computers & Technology
A production line at a beverage company has installed a program that uses a series of statements that perform a specific task. The program is set in such a way that the functions are called directly from the main function multiple times. Which type of programming language does the production line use?
Answer
Answers (1)
Conor
Computers & Technology
In a paragraph of no less than 125 words, discuss special considerations for using blogs and wikis in research.
Answer
Answers (1)
Adelaide
Computers & Technology
Jill uses Word to create an order form. She starts out by creating a table that has three columns and ten rows. What should she do to have her heading span the width of the entire table?: *
a. merge the top two cells
b. merge the top three cells
c. merge the three columns
d. widen the first cell
Answer
Answers (1)
Margaret Pittman
Computers & Technology
Many smartphones and mobile devices have software that shows the approximate location of devices and computers.
a. True
b. False
Answer
Answers (1)
Carlo Warner
Computers & Technology
What is the purpose of document inspector
Answer
Answers (1)
Spanky
Computers & Technology
A pangram is a sentence that contains all the letters of the English alphabet at least once. For example, the quick brown fox jumps over the lazy dog is a pangram. The program you are to write must read in an input file (input. txt - a plain text file which contains 5 sentences), line by line and check if the line read is a pangram or not. If the sentence read is a pangram, it writes true to the output file. If it is not, it writes false to the output file. Create a pangram function that takes in two strings as arguments: the first for the name of input file and second for the name of output file.
Answer
Answers (1)
Julie Stevenson
Computers & Technology
Most computer attacks are designed to steal information or money. Which of the following attacks is designed to slow down or stop a Web site, often to prevent legitimate users from accessing the Web site? A) Man-in-the-middle attack.
B) Cross-site scripting attack.
C) Dictionary attack.
D) DoS attack.
E) Spoofing attack.
Answer
Answers (1)
Alessandro Mccall
Computers & Technology
Which activity depicts the practices of an ethical organization?
Answer
Answers (1)
Cassandra Garza
Computers & Technology
Ram is form of output devices?
Answer
Answers (1)
More
1
...
163
164
165
166
167
...
Home
»
Computers & Technology
» Page 165
Sign In
Sign Up
Forgot Password?