SantabeHub
Home
Search
Search
Computers And Technology Questions
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
____ allows you to add formatting such as shapes and colors to text
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Is kawahi lenord a good player
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
How to change the frequency on rc boats
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
What type of software program is Adobe Photoshop CS4?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
One of the biggest risks involved in using e-mail isa. loss of privacy. b. junk mail. c. slowness. d. lost attachments.
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
Savings accounts usually offer _________ interest rates than checking accounts. It is _________ to access your money in a savings account than in a checking account.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
The word processing feature that allows you to refer to prior versions and edits is?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
What should be done with statements or sections which are unclear?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Which troubleshooting procedure is most useful when the operating system reports that a file cannot be opened? (A.)rebooting the computer(B.) running the hard disk drive utility (C.)moving the file to a different folder(D.) renaming the file
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Which of the following symbols comes first when a formula or function is written in a spreadsheet?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Before a new electrical installation can be connected to the source of electricity, it must be examined and approved by A. a local inspection agency. B. an electrical code committee. C. the Underwriters Laboratories. D. the National Fire Protection Association.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
What is a SIEM (Security Information and Event Management) system utilized for?a. It is an advanced intrusion protection system with a GUI-frontend. b. it is a system used to evaluate data from security devices and generate alerts. c. It is an intellectual property protection software that prevents data links, and generates alerts. d. It is a system that monitors security device hardware availability
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
How comfortable are you with short deadlines and new trends in a fast-paced environment?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
what is one of the differences between random access memory (ram) and read only memory (rom)? responses ram is used by individuals, and rom is used by businesses and organizations. ram is used by individuals, and rom is used by businesses and organizations. ram is easily accessed and altered, and rom cannot be easily altered. ram is easily accessed and altered, and rom cannot be easily altered. rom is used by individuals, and ram is used by businesses and organizations. rom is used by individuals, and ram is used by businesses and organizations. rom is easily accessed and altered, and ram cannot be easily altered. rom is easily accessed and altered, and ram cannot be easily altered.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Which of the following is NOT a way the media communicates unrealistic body images?a. digitally altering images b. providing a forum to discuss actors/actresses c. criticizing high-profile individuals d. promoting all body types
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Sofar was developed to:
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Assume your using a three button mouse to access shortcut menus you would
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Run a presentation from the beginning by clicking the Start From Beginning button located?a. on the ribbon. b. on the FILE tab. c. on the Quick Access toolbar. d. in the slide thumbnails pane.
« Previous
Page 11
Next »