SantabeHub
Home
Search
Search
Computers And Technology Questions
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Who was the inventor of the printing press?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
A(n) ____ is an attack that takes advantage of a system vulnerability.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
24) The process of ensuring the accuracy of data and their conversion from raw form into classified forms appropriate for analysis is called _____.A. coding B. data entry C. data preparation D. data measurement
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Which one of the following is the most accurate definition of technology? A Electronic tools that improve functionality B Electronic tools that provide entertainment or practical value C Any type of tool that serves a practical function D Any type of tool that enhances communication
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Your laptop doesn't have a serial port. what type of connector will your laptop require
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
What is a computer??????????????????????????????????????????????????????????
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
The first computers stored their results on paper cards? True or false
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
NEED ANSWER ASAPLance has three tables in his database. He wants to generate a report to show data from the three tables. So, he decides to link the tables. What type of fields will help Lance to create the relationships? Lance will have to identify the ________ in his tables to help him link the tables.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Each device connected to a network is called a(n) ________.
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
Query " frosty the snowman
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Of the following statements are applicable to an actor in a use case diagram? Select all the statements which are true. a) An actor represents a user or another system interacting with the system being modeled. b) An actor must be a physical person. c) An actor can initiate and participate in use cases. d) An actor cannot be part of more than one use case.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
three analog signals, having bandwidths 1200 hz, 600 hz, and 600 hz are sampled at their respective nyquist rates, encoded with 12 bit words, and time division multiplexed. the bit rate for the multiplexed signal is
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Which type of interview is conducted in a format where the interviewee is questioned and presented to a panel of individuals?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
You've just done a search in an online reference tool, and your results are as follows: canine, cur, doggie, hound, mutt, mongrel, pooch, and puppy. What kind of online reference tool are you using?a. thesaurus b. atlas c. dictionary d. translation
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an example of a _____________, ____________-based IDS/IPS.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Unlike _______, XHTML can be extended by anyone who uses it. A. SGML B. HTML C. SML D. XML
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
What is the keyboard shortcut Ctrl+Z used for?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Which of the following is true of utility patents? Select one:a. They are implemented to protect intangible abstractions. b. They are valid for the lifetime of the inventor. c. They are used to patent machines and processes. d. They are obtained for the ornamental nonfunctional design of an item.
« Previous
Page 34
Next »