Search
Questions in computers-and-technology
[Answered] What is a bridge between two networks? A. Gateway B. MAC Address C. Protocol D. IP Address
[Answered] Fill in the blanks: _____ are referred to as document in MS-Word. Changing the appearance of the text is called _____ _____ means the manner in which the characters appear. _____ makes the text in slanting position.
[Answered] Which are three benefits of using the Fusion Cloud Integration Cloud for custom code creation and maintenance? Options: * FUSION supports external integration using REST services to bring your custom code into the Oracle Cloud Ledger. * FUSION provides the end experience with an integration to make sure the data is displayed the way the customer wants. * FUSION is used for single or bulk reference number of code. * FUSION uses the spreadsheet to view only and display reference code in the UI. * FUSION can be used to build a custom, updated, and secure custom reference code.
[Answered] What version of the iPad mini was announced in 2013? A) iPad Air B) iPad Water C) iPad Earth D) iPad Fire
[Answered] Which shortcut in Windows allows you to cut? A. F10 B. Ctrl+X C. Alt+Spacebar D. F5
[Answered] Select the icon of subscript: X² X2 Aa U
[Answered] Convert the following CFGs to PDA: S → aA A → aABC | bB | a B → b C → c
[Answered] Answer the following questions. 1. Who invented the abacus? What was its purpose? 2. What are the main features of fifth-generation computers? 3. What are mainframe computers and where are they used? 4. Name five areas where supercomputers are used. 5. What were the problems in first-generation computers? Differentiate between the following. 1. Laptop and Desktop 2. Laptop and Notebook 3. Supercomputer and Mainframe computer
[Answered] Which statement describes the concept of cryptographic hashing? Choose one of the following. 1. It verifies data integrity by creating a unique fingerprint of the data. 2. It is a reversible process that allows retrieval of the original data. 3. It encrypts data to prevent unauthorized access. 4. It is a way to compress data to save storage space.
[Answered] What should Justin do in this instance? Select one: A. Pay the ransom, then notify his security officer of the potential cyber attack. B. Do not pay the ransom; notify his security officer of the potential cyber attack immediately. C. Pay the ransom; he needs to access his files to be able to complete his work. D. Shut down the computer; this must be a temporary attack and he knows to shut down in the event of an attack
« Prev
1
...
28
29
30
31
32
...
45
Next »