Task Tackler
Home
Search
Login
Search
Computers and Technology
Computers And Technology
High School
At the same time (and in the same area of Europe) that Johann Gutenberg invented moveable type, an unidentified artist called the Master of the Playing Cards created the earliest known __________.
Computers And Technology
High School
If the last digit of a 2's complement binary number is 0, then the number is even. If the last two digits of a 2's complement binary number are 00 (e.g., the binary number 01100), what does that tell you about the number?
Computers And Technology
College
Listed below are the five steps for planning a Windows Forms application. Put the steps in the proper order by placing a number (1 through 5) on the line to the left of the step. _____________________ Identify the items that the user must provide. _____________________ Identify the applications purpose. _____________________ Draw a sketch of the user interface. _____________________ Determine how the user and the application will provide their respective items. _____________________ Identify the items that the application must provide.
Computers And Technology
Middle School
n the formula "=A3/B3", what part of the formula is the "/"?
Computers And Technology
College
Write a program that reads in characters from standard input and outputs the number of times it sees an 'a' followed by the letter 'b'.
Computers And Technology
High School
You have just plugged a USB portable hard drive into an older laptop and the disk has not appeared as available. You are concerned that the hard disk controller hardware has not been recognized by the computer. What utility would you use to verify that the controller is functioning correctly?Device Manager T/F
Computers And Technology
High School
Which of the following refers to the data analysis software and interactive software that allow managers to conduct analyses and find the information they need? A. Market intelligence system B. Intranet C. Marketing decision support system (MDSS) D. Market research E. Marketing information system (MIS)
Computers And Technology
High School
Intranets:a. provide the platform on which a firm builds its information systems.b. are typically used to communicate with the business's trusted vendors.c. are based on mainframe technology.d. use Internet technology for a private company network.e. are multiple networks joined together.
Computers And Technology
Middle School
Select the correct answer.Which statement is true about the elements of the interface of a presentation program?OA. The status bar appears at the top of the page and displays options to style your slides.B. The tool bar displays the thumbnails of your presentation slides in the order they will appear in the presentation.C. Rulers indicate the margins, tabs, and indents in a presentation slide.D.The document area provides a list of commands to create, format, and edit presentations.ResetNext
Computers And Technology
High School
A network administrator is setting up a web server for a small advertising office and is concerned with data availability. The administrator wishes to implement disk fault tolerance using the minimum number of disks required. Which RAID level should the administrator choose>?
Computers And Technology
High School
Which is true about POP3 and IMAP for incoming email?Both keep email on an email server by defaultIMAP keeps email on an email server by defaultNeither keep email on an email server by defaultPOP3 keeps email on an email server by default.
Computers And Technology
Middle School
Question #1Which of the following shows the correct evolution of marketingover time?Marketing Era - Selling Era - Production Era - RelationshipEraProduction Era - Selling Era - Marketing Era - RelationshipEraRelationship Era - Selling Era - Marketing Era - ProductionEraSelling Era - Relationship Era - Production Era - MarketingEra
Computers And Technology
College
In the case of a security incident response, the Building and Implementing a Successful Information Security Policy whitepaper cautions that __________ is often critical in limiting the damage caused by an attack.
Computers And Technology
College
Create a class Cola Vending Machine. This class is simulating a cola vending machine. It keeps track of how many cola bottles are in the class and how much one bottle costs. There should be a method sell Bottle which sells one bottle to a customer, decreases the amount of bottles left. There also is a method restock which sets the number of bottles to the number it is restocked to. Write a main method to test the functionality of the Cola Vending Machine machine.
Computers And Technology
College
"Which of the following sets the window width to 100 pixels and the height to 200 pixels? A) setSize(100, 200); B) setSize(200, 100); C) setDims(100, 200); D) set(200, 100);"
Computers And Technology
High School
How has the perception of the hacker changed over recent years? What is the profile of a hacker today?
Computers And Technology
High School
Angela's ready to get started with her first Smart Display campaign, but her account isn't yet eligible due to not having enough conversions in the last 30 days. What's the minimum number of conversions needed (in the last 30 days) to be eligible to set up a Smart Display campaign?1. At least 50 conversions on Display or at least 100 conversions on Search. 2. At least 30 conversions on Display or at least 50 conversions on Search.3. At least 100 conversions on Display or at least 50 conversions on Search.4. At least 50 conversions on Display or at least 30 conversions on Search.
Computers And Technology
College
True or False? An embedded system is computing technology that has been enclosed in protective shielding for security reasons.
Computers And Technology
High School
You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting from the Physical layer of the OSI model. Which of the following approaches would you use to troubleshoot this problem?a. Random layer approachb. Divide and conquer approachc. Bottom up approachd. Top down approach
Computers And Technology
College
You will be given a grocery list, followed by a sequence of items that have already been purchased. You are going to determine which items remain on the the list and output them so that you know what to buy.You will be give an integer n that describes how many items are on the original grocery list. Following that, you will be given a list of n grocery list items (strings) that you need to buy. After your grocery list is complete, you will receive a list of items that had already been purchased. For each of these items, if it matches any item on your grocery list, you can mark that item as purchased. You will know that you are at the end of the list of items already purchased when you receive the string "DONE".At that point, you will output a list of items left to buy (each item on its own line).Write the body of the program.DetailsInputThe program reads the following:an integer, n, defining the length of the original grocery listn strings that make up the grocery lista list of items that had already been purchased (strings)the string "DONE", marking the end of all required inputProcessingDetermine which items on the grocery list have already been purchased.
Computers And Technology
High School
Which of the following is an example of a protocol?IPsecCPUVPNPSU
Computers And Technology
Middle School
An experienced user has installed Oracle VM VirtualBox on her workstation and is attempting to use it to create a virtual machine (VM). The software is causing error messages while attempting to create the VM. What is the most likely problem? a. The user does not know how to use the software. b. Virtualization is not enabled in BIOS/UEFI. c. The version of Windows she is using is not rated for installations of Oracle software. d. The processor is not rated to support VirtualBox and VMs.
Computers And Technology
College
3) According to the five-component model of information systems, the ________ component functions as instructions for the people who use information systems. A) software B) data C) hardware D) procedure
Computers And Technology
Middle School
Questions1) Listen)Which function does an Internet content filter NOT perform?content inspectionintrusion detectionmalware inspectionURL filtering
« Previous
Page 3
Next »