SantabeHub
Home
Search
Search
Computers And Technology Questions
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Unplugging a computer can result in the information in what location being lost?A) Floppy disc B) Document Files C) RAM D) NIC
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Drag each item to the correct location.(1 point) Put responses in the correct input to answer the question. Select a response, navigate to the desired input and insert the response. Responses can be selected and inserted using the space bar, enter key, left mouse button or touchpad. Responses can also be moved by dragging with a mouse. TRUE FALSE
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
What end mark comes after the end of a request or a command?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
A benefit of flashcards is that they area. Portable c. Very large b. Contains lots of information d. Ask many questions on one card
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
In this type of network, data is certain to reach its destination.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Dies are turned using a special tool called
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
MAX, MIN, COUNT, and SUM are examples of:a. Functions. c. Lookups. b. AutoFormats. d. Alphabetic and numeric data.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
A pure aggregator is best defined as a blog that
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Explicit location always tells you where user located when they type the query. T or F
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Computer trespass can be harmless. a. True b. False
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
A. Trueb. False If a coder is unable to locate a code that describes the exact service provided, it is acceptable to use a code approximates the service provided.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
16. In Microsoft Word, when you highlight existing text you want to replace, you are in
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
The term “clone” is a reference to a computer’s
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Software that interprets commands from the keyboard and mouse is also knows as
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
What is cloud computing?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Which tools would you use to make header 1 look like header 2.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
what is not a feature of the oracle autonomous databse to protect data from external and internal threats? a. data encryption b. admin passwords are disabled
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
When a patient is jumbling words that are meaningless, this is an example of what?
« Previous
Page 25
Next »