Sign In
Ask Question
Ortiz
Computers & Technology
A reason improper use of netiquette can be risky is that users can
A. Become vulnerable to online harassment
B. Access inappropriate websites.
C. Have their private information stolen.
D. Receive unwanted spam.
Answer
Answers (2)
Leonidas Brady
Computers & Technology
What are the 4 main types of parking
Answer
Answers (1)
Keyla Fox
Computers & Technology
Which of the following entities was the most instrumental in early development of the Internet?
defense contractors
large businesses
private businesses
large universities
Answer
Answers (1)
Stitch
Computers & Technology
Which of the following is software? : Monitor Mouse Windows Keyboard Printer
Answer
Answers (1)
Guest
Computers & Technology
You work for a computer reseller. A customer walks in and asks you what the main differences are between a Mac and a PC. You tell her that there are slight differences in the look and feel. Additionally, which statement do you tell her to best answer her question?
a - There are no other differences.
b - Bundling and versioning are the main differences.
c - Distribution and development are the main differences.
d - The differences are not significant.
Answer
Answers (1)
Scarlett
Computers & Technology
What information does a Transform hold? (Choose all that apply)
Scale
Position
Rotation
Velocity
Answer
Answers (1)
Guest
Computers & Technology
A structure is private by default, but can be declared to be friend or private.
Answer
Answers (1)
Ahmed Mccann
Computers & Technology
Incomplete Configuration identification documents may resultin:
a) Defective Product
b) Higher Maintenance Costs
c) Schedule Product
d) Meet Software Quality
e) A, B, C
f) B, C, D
Answer
Answers (1)
Alvin Copeland
Computers & Technology
Why would a person who handles electronic components wear a grounded wrist strap
Answer
Answers (1)
Guest
Computers & Technology
In binary, the second digit from the right is multiplied by the firstzerothsecond power of two, and the fourthfifthsixth digit from the right is multiplied by the fourth power of two.
Answer
Answers (1)
Dwayne Villanueva
Computers & Technology
Software that people commonly use in the workplace to make their lives easier is called what?
Answer
Answers (1)
Cayden
Computers & Technology
Which file extension indicates a text document?
A-. txt
B-. ppt
C-. tst
D-. pdf
Answer
Answers (2)
Amina Whitehead
Computers & Technology
From the followings options, which is NOT a true format for SUM formula? a) = sum (a1:b5:c5) b) : sum (a1, b5, c5) c) : sum (a1 : b5, c5) d) : sum (al:b5, c1:c5)
Answer
No Answers
Olivia Davila
Computers & Technology
You want to implement an ethernet network at very long distance using fiber optic cables. Which standard and cable type would you choose? Select two answers. - Multi mode fiber - 1000BaseSX - 1000BaseLX - Single mode fiber - 1000BaseCX
Answer
Answers (1)
Braniac
Computers & Technology
What is the process called that determines how bits are represented on the medium?
Answer
Answers (1)
More
1
...
67
68
69
70
71
...
Home
»
Computers & Technology
» Page 69
Sign In
Sign Up
Forgot Password?