Sign In
Ask Question
Computers & Technology
Yaritza Arias
Which multimedia choice would be most effective in persuading blog readers to plant a vegetable garden?
a video clip featuring a giant animated carrot
a photo including turn-of-the-century farmers
a graph illustrating the vegetables grown in the US
a clip of an interview with a successful teenaged gardener
Answer
Answers (1)
Computers & Technology
Samara Diaz
What is Data validation? (in a simple definition)
Answer
Answers (2)
Computers & Technology
Guadalupe Perry
What are examples of common computer software problems? Check all that apply
Pages with fading ink come out of a printer.
Programs suddenly quit or stop working.
O Documents close without warning.
O A video file stops playing unexpectedly.
A program updates to the latest version.
A computer crashes and stops working.
Answer
Answers (1)
Computers & Technology
Harley Gomez
Your network administrator finds a virus in the network software. Fortunately,
she was able to eliminate it before it resulted in a denial-of-service attack, which
would have prevented legitimate users of the networked database from
gaining access to the records needed. It turns out that the network software
did not have adequate security protections in place. this could be considered.
A. threat
B. vulnerability
Answer
Answers (1)
Computers & Technology
Damion French
Which of the following store your information in the cloud? (select all that apply)
1) Facebook
2) Dropbox
3) USB flash drives
4) Instagram
5) Gmail
6) RAM
Answer
Answers (1)
Computers & Technology
Quintin Frye
Im doing a procect for spanish what is the wether in Colombia Bogota
Answer
Answers (1)
Computers & Technology
Philip
Which is a good plan for backing up data?
Answer
Answers (1)
Computers & Technology
Noelle
In writing a paper for his English class, Gavin quoted an author of the book. What should he include in his paper to credit the source?
Citation
Caption
Header
Entry
Answer
Answers (1)
Computers & Technology
Amanda Best
Which two hardware features would a technician monitor within the bios if a computer was suspected of overheating?
Answer
Answers (1)
Computers & Technology
Kismet
Which of the following statements about Java Class Libraries is false: a. Java class libraries consist of classes that consist of methods that perform tasks. b. Java class libraries are also known as Java APIs (Application Programming Interfaces). c. An advantage of using Java class libraries is saving the effort of designing, developing and testing new classes. d. Java class libraries are not portable
Answer
Answers (1)
Computers & Technology
Nehemiah Strong
In 4-bit sign magnitude representation, what is the binary encoding of the number - 5?
a) 1011
b) 1010
c) 1101
d) 0101
Answer
Answers (1)
Computers & Technology
Ezequiel
Both of the following for clauses would generate the same number of loop iterations.
for num in range (4):
for num in range (1, 5) :
Answer
Answers (1)
Computers & Technology
Jaslene Mason
Which type of learner learns best through hands-on activities?
interpersonal
verbal/linguistic
logical/mathematical
bodily/kinesthetic
Answer
Answers (1)
Computers & Technology
Madden Berry
Which of the following is an example of synchronous communication? A) e-mail
B) voicemail C) telephone conversation D) text message.
Answer
Answers (2)
Computers & Technology
Aron Wiley
You can create a (blank)
unity of appearance by
(Blank) key elements (symbols, logos, boxes, rulers, graphics) across your graphic product.
Answer
Answers (1)
More
1
...
26
27
28
29
30
...
Home
»
Computers & Technology
» Page 28
Sign In
Sign Up
Forgot Password?