IdeasCuriosas - Every Question Deserves an Answer Logo

Questions in computers-and-technology

[Answered] You've been asked to help build a presentation, but you don't normally have access to presentation software. You've used the free version of a different presentation software at home. What should you do? A. Read the software's Terms & Conditions carefully to ensure the information you will include in the presentation is protected. B. Use the free software for this project and confirm it with IT later. C. Send the information to your personal email and then create the presentation on your home computer. D. Ask IT what the approved presentation software is and submit a request to gain access to it.

[Answered] The CCPA does not apply to which of the following? A. Biometric information about a consumer B. A consumer's internet or electronic network activity C. A consumer's geolocation data D. Medical information about a consumer governed by the Confidentiality of Medication Information Act

[Answered] What is the main goal of the fifth generation of computers? Your father wants to buy a device for your younger brother to help him learn counting. Which calculating device would you suggest?

[Answered] Which of the following types of threat intelligence provides information about specific threats against an organization? A. Operational threat intelligence B. Dynamic threat intelligence C. Tactical threat intelligence D. Strategic threat intelligence

[Answered] Each place value in a binary number represents $\qquad$ raised to the appropriate power. A. 10 B. 2 C. 0 D. 1

[Answered] What is obtaining intelligence directly from attackers through the dark web and honeypots known as? Option A: Human intelligence Option B: Open-source intelligence Option C: Internal intelligence Option D: Counterintelligence

[Answered] MS Excel gives facility to change: A) Font Color B) Border Color C) Cell Background D) All of above

[Answered] Which statement best describes applications developers? A. They must have knowledge of network security. B. They must have excellent organizational skills. C. They must understand how microprocessors work. D. They must be able to create, maintain, and improve software.

[Answered] Which of the following types of threat intelligence is mainly collected from sources such as campaign reports, malware, incident reports, attack group reports, and human intelligence? A. Operational threat intelligence B. Tactical threat intelligence C. Dynamic threat intelligence D. Strategic threat intelligence

[Answered] What will be the result returned by the given snippet for the dataset given below? =VLOOKUP(A2,A2:C7,3,TRUE) | | A | B | C | | :----- | :------- | :--------- | :--- | | 1 | Name | Department | ID | | 2 | Sally | HR | 10 | | 3 | Ash | HR | 21 | | 4 | Misty | Sales | 11 | | 5 | Brock | Account | 23 | | 6 | Jennet | Sales | 33 | | 7 | Jemma | Business | 12 | A. 33 B. $100,000.0 C. 12 D. 10