Search
Questions in computers-and-technology
[Answered] Fill in the blanks with the help of words given in the box: Notification area, Booting, Taskbar, Start button, Icons 1. Switching on the computer is called ________. 2. ________ are labelled pictures on the screen. 3. The ________ is the longest horizontal bar at the bottom of the desktop. 4. ________ is present at the bottom left corner of the taskbar. 5. The right side of the Taskbar contains the ________.
[Answered] How many times would the following loop iterate? For j = 1 To 5 Step 2 Display j End For A) 4 B) 5 C) 3 D) 0
[Answered] An electric device delivers a current of [tex]$15.0 A$[/tex] for 30 seconds. How many electrons flow through it?
[Answered] i = 0 while i < 5: i = i + 1 print(i*3) What is the output of the above code? a. 0 1 2 3 4 b. 1 2 3 4 5 c. 0 3 6 9 12 d. 3 6 9 12 15
[Answered] 172. Where does the computer process data? A. UPS B. CPU C. Monitor D. Mouse 173. The data the computer accepts is known as A. data intake B. output C. input D. data come 174. The information the computer gives out is called A. Out information B. Output C. Outside data D. Game 175. Data is entered into the computer system through its A. wire B. input devices C. output devices D. monitor 176. is an example of input device. A. Keyboard B. Printer C. Speaker Write the following computer words correctly: 177. ogAnal = A. Analog B. longal C. organol D. Amnallog E. lognal 178. troConil = A. troCont B. Control C. lontrol D. ontol E. lontoil 179. hatC = A. hate B. Chat C. tach D. htal E. hatt 180. agitDil = A. Digital B. Ditdi C. Digts D. D Stgits D. Lgit 181. omCmand = A. Commond B. Dommd C. Command D. Cmmond E. None of the above 182. etteDkis = A. Diskette
[Answered] Student -id: int -name: String +borrowBook(): void +returnBook(): void Book -title: String -author: String +getDetails(): void Librarian -empId: int -name: String +addBook(): void +removeBook(): void Fine -fineId: int -amount: float +payFine(): void Library -name: String -location: String
[Answered] Explain the memory device used in the first generation of computers. Describe any two limitations of this generation.
[Answered] The security firewall serving Vantage's email program catches an impressive number of both irrelevant and illegitimate messages, to the point where employees usually do not even see them. Occasionally, however, an unsolicited message will catch managing partner Carl's eye. Because one new message looks to come from a potential new client, he's interested but careful, aware that the boutique consulting firm has a very targeted marketing system and clients usually do not appear out of thin air. What type of security concern is causing Carl's suspicion? Multiple Choice: A) DDoS B) Packet sniffers C) Phishing D) Rootkit
[Answered] _____ is the time utilized by a dialog work process to access data from the database and return to the presentation layer. (A) Response time (B) Presentation time (C) Delay Time (D) None of these
[Answered] How do breach and attack simulation technologies help white-hat hackers test security? A. They execute thousands of attack techniques continuously to reveal weaknesses. B. They are more sophisticated tools that illegitimate hackers do not have access to. C. They enable white-hat hackers to charge companies more while doing less work. D. They focus on infiltration and make it easier to provide one-dimensional analysis.
« Prev
1
...
81
82
83
84
85
...
106
Next »