Sign In
Ask Question
Computers & Technology
Emilio Castaneda
By what other name is web-based software known as
Answer
Answers (1)
Computers & Technology
Justine Beck
What is the disk bandwidth? the total number of bytes transferred total time between the first request for service and the completion on the last transfer the total number of bytes transferred divided by the total time between the first request for service and the completion on the last transfer none of the mentioned
Answer
Answers (1)
Computers & Technology
Brent Morse
You have been asked to provide an account for an outside consultant, who needs limited access to the network for a very short period of time. Which type of account will you give this person?
Answer
Answers (1)
Computers & Technology
Nora Wolfe
What is the name of the domain controller database that windows server 2016 uses to store data about user access and resources on the network?
Answer
Answers (1)
Computers & Technology
Jonas Burnett
What is the output of the second println statement in the main method, public class foo { int i; static int s; public sttic void main (string[] args) { foo f1 = new foo (); system. out. println ("f1, i is " + f1. i + f1. s is " + foo f2 = new foo (); system. out. println (" f2. i is " + f2. i + f2. s is " + foo f3 = new foo (); a) f2. i is 1 f2. s is 1. b) f2. i is 1 f2. s is 2. c) f2. i is 2 f2. s is 2. d) f2. i is 2 f2. s is 1. e) f2. i is 0 f2. s is 1.
Answer
Answers (1)
Computers & Technology
Jon Dennis
Which of the following could be a constructor for the public class MyClass? a. public MyClass () b. public void MyClass () c. public MyClass (int a, double b)
Answer
Answers (1)
Computers & Technology
Gina
Which of the following is a dynamic routing protocol in which routers periodically broadcast their entire routing tables to neighboring routers
Answer
Answers (1)
Computers & Technology
Ireland Kane
In which utility is the file search option found in windows
Answer
Answers (1)
Computers & Technology
Jayleen
8. You can use the Quick Styles drop-down menu to add a visual style to a shape
or line. *
True
False
Answer
Answers (2)
Computers & Technology
Brooke Clarke
Find out if you can declare a variable of type dword and assign it a negative value. what does this tell you about the assembler's type checking?
Answer
Answers (1)
Computers & Technology
Opie
A ddos stands for one of the common forms of viruses, that attack multiple computers to flood a website until it slows or crashes. what does ddos stand for
Answer
Answers (1)
Computers & Technology
Chelsea Cummings
Which option in presentation software can you use to apply a "fly in" effect to the objects on a slide?
Answer
Answers (1)
Computers & Technology
Juliana Rowland
How to open the same document twice in word?
Answer
Answers (1)
Computers & Technology
Luke Lamb
Which of the following would be a best practice to prevent users from being vulnerable to social engineering?
(A) Provide thorough and frequent user awareness training
(B) Provide a service level agreement that addresses social engineering issues
(C) Have a solid acceptable use policy in place with a click through banner
(D) Have users sign both the acceptable use policy and security based HR policy
Answer
Answers (1)
Computers & Technology
Sims
When you are pasting an item, what choice will the Paste Options button offer you?
Answer
Answers (1)
More
1
...
150
151
152
153
154
...
Home
»
Computers & Technology
» Page 152
Sign In
Sign Up
Forgot Password?