Sign In
Ask Question
Evangeline Delacruz
Computers & Technology
If you bury a story on digg what have you done?
a) voted down a web page
b) voted up a web page
c) withdrawn a story
d) archived a story
Answer
Answers (2)
Cara Burgess
Computers & Technology
Q4. Consider a system that uses pure demand paging. (10 pts) When a process first starts executing, how would you characterize the page fault rate? Once the working set for the process is loaded into memory, how would you characterize the page fault rate? Assume that a process changes its locality and the size of the new working set is too large in available free memory. Identify some options system designers could choose from to handle this situation.
Answer
Answers (1)
Nylah House
Computers & Technology
How does a hard drive work in computers
Answer
Answers (1)
Uriah Herrera
Computers & Technology
James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the data is no longer on the drive before he throws it away. What can James use to wipe the data clean?
a. Zero-fill utility
b. Format the drive
c. ATA Secure Erase
d. Smash the USB drive
Answer
Answers (1)
Isai Randolph
Computers & Technology
The programmer who creates or maintains the software framework that a video game is developed around is the
A. lead programmer
B. game engine programmer
C. gameplay programmer
D. UI programmer
Answer
Answers (1)
Kaliyah Dawson
Computers & Technology
14. You can store data copied from any Office application file with the
A. Office Clipboard.
B. File tab.
C. Home tab.
D. Outline Clipboard.
Answer
Answers (2)
Alisa Bauer
Computers & Technology
A user is instructed by a boss to find a better method to secure passwords in transit. The user has researched several means to do so and has settled on using HMAC. What are the key elements needed to implement HMAC?
A) Secret key and message digest
B) Symmetric key and asymmetric key
C) IPsec and checksum
D) Message digest and asymmetric key
Answer
Answers (1)
Jaelynn
Computers & Technology
Complex communication skills will probably never be outsourced to a computer because they require the human touch.
a. True
b. False
Answer
Answers (1)
Braden Steele
Computers & Technology
Define the term program
Answer
Answers (1)
Ingrid Steele
Computers & Technology
Arrange the steps for conflict resolution in proper sequence.
Answer
Answers (1)
Jaydin
Computers & Technology
Which component of the windows desktop allows you to retrieve files that have recently been deleted?
a. taskbar
b. my computer icon
c. start button
d. recycle bin icon
Answer
Answers (1)
Dana
Computers & Technology
You were discussing software piracy with a friend and were surprised to learn how software piracy can impact our life every day. What is a risk or an effect of software piracy?
Answer
Answers (1)
Adrian Weber
Computers & Technology
Suppose two hosts, A and B, are separated by 15,000 kilometers and are connected by a direct link of R = 5 Mbps. Suppose the propagation speed over the link is 2.5 * 108 meters/sec. How long does it take to send a 1,500,000 bit file, assuming it is sent continuously?
Answer
Answers (1)
Moses Kaiser
Computers & Technology
What type of coverage pays for damage incurred as a result of theft, vandalism, fire or natural disaster?
Answer
Answers (1)
Guest
Computers & Technology
The employment potential of the Education and Training career cluster in 2020 compared to other clusters is expected to be
Answer
Answers (1)
More
1
...
189
190
191
192
193
...
Home
»
Computers & Technology
» Page 191
Sign In
Sign Up
Forgot Password?