Sign In
Ask Question
Computers & Technology
Mikaela Ryan
List 4 activities that might be included as part of a dependable software engineering process. Which of these do you think are most achievable for a small, agile project such as the course project? (Perhaps your team is doing one or more already!)
Answer
Answers (1)
Computers & Technology
Adolfo Mcknight
A camera scan of grieving Columbine family members and friends_
-is known as disaster fatigue.
-is an invasion of privacy and therefore not newsworthy
-is known as ethnocentrism.
-is questionably newsworthy because it brings celebrity status to the culprit.
-is too dangerous just for the sake of promoting ratings.
-is okay and newsworthy.
Answer
Answers (1)
Computers & Technology
Uriah Schultz
Write a recursive, int-valued function, len, that accepts a string and returns the number of characters in the string. The length of a string is: 0 if the string is the empty string (""). 1 more than the length of the rest of the string beyond the first character.
Answer
Answers (1)
Computers & Technology
Joyce Lawrence
Which of the following is a true statement? Question 33 options: Data entities correspond to sources/sinks on a data flow diagram. An entity type is described many times in the data model. A data entity will have many possible instances. Verbs are used to name entity types. Relationships correspond to data flows on a data flow diagram.
Answer
Answers (1)
Computers & Technology
Yadiel Middleton
What is the output of the following code fragment? int i = 1; int sum = 0; while (i < = 15) { sum = sum + i; i++; } System. out. println ("The value of sum is " + sum);
Answer
Answers (1)
Computers & Technology
Cher
Layer 3 of the Transmission Control Protocol/Internet Protocol (TCP/IP) is called the Internet Layer. Describe the functions of this layer.
Answer
Answers (1)
Computers & Technology
Aurora
What Jim Crow law did Eleanor Roosevelt break?
Answer
Answers (1)
Computers & Technology
Ariel Ferguson
What instruments are used the measure voltage, current, and resistance
Answer
Answers (1)
Computers & Technology
Tyrone Richardson
What are the three main parts of a camera?
Answer
Answers (2)
Computers & Technology
Ashlyn Villa
Examine the exhibit above. "Device A" is an 8-port layer 2 managed switch and "Device C" is a 4-port hub. Which of the following describes "Device B," assuming all workstations can communicate with each under normal circumstances?
A. Layer 2 switch
B. Router
C. Bridge
D. Repeater
Answer
Answers (1)
Computers & Technology
Brennen
A web browser is best described as a-
Options
General purpose application program
Application specific program
System management programs
System development programs
Answer
Answers (1)
Computers & Technology
Demetrius Greene
Define a forest root domain.
Answer
Answers (1)
Computers & Technology
Norah
A station running TCP/IP needs to transfer a file to a host. The file contains 2048 bytes. Assume a payload size of 512 bytes would be sent per packet and both systems are running IPv4. Also assume that the three-way handshake and window size negotiation have been completed and that no errors occur during transmission. a. What is the protocol overhead
Answer
Answers (1)
Computers & Technology
Josephine Meza
Will upvote all answers!
Which of these sets of data would be best presented by a pie chart?
Results of a presidential election
Yearly enrollment numbers for GCA
Daily temperatures for the month of December
Answer
Answers (1)
Computers & Technology
Owen Landry
What is virtualization? What are the benefits we can have with it?
Answer
Answers (1)
More
1
...
59
60
61
62
63
...
Home
»
Computers & Technology
» Page 61
Sign In
Sign Up
Forgot Password?