SantabeHub
Home
Search
Search
Computers And Technology Questions
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Whats in a computer?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
What is the operation of an earth leakage tester
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Keeping in mind the role the order of precedence plays in equations, what would Excel display as the result of the following equation? =(24+75)/(6*3)
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
A small network used for communication between personal computing devices is known as?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
The Internet consists of interconnected computer networks throughout the world that everyone can use. a. True b. False
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Which are *four* best practices used in the access layer? a. Disable trunking in host ports. b. Limit VLANS to one closet. c. Use PVST+ as the STP with multilayer switches. d. Enable trunking on host ports. e. Use VLAN spanning to speed convergence of STP. f. Use VTP Server mode in hierarchical networks. g. Use VTP Transparent mode in hierarchical networks. h. Use RPVST+ as the STP with multilayer switches.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Which one of the following libraries are mainly designed for machine vision? 1. Torch 2. Caffe 3. Deeplearning4j 4. Theano
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
a) To calculate the Amount for Keyboard: SUM(D2:D6) b) To calculate the Amount for Mouse: SUM(D7:D11) c) To calculate the Amount for USB drive: SUM(D12:D16) d) To calculate Maximum Price: MAX(D2:D16) e) To calculate Average Price: AVERAGE(D2:D16)
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
A Boolean search can help you narrow down your topic by doing what A( finding the most popular topic for you to research B( allowing you to restrict your search to look only for specific terms or groups of terms C(avoid searching for him popular topics D( searching the topic and all related topics
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
You are concerned about your VMs receiving rogue DHCP servers. How can you prevent this from happening?
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
This man is using a power saw.what do you think he is making?what simple machine is it
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Which software scans your computer for viruses in the operating system, emails, files, or hard disks, and then deletes them?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
An unauthorized program typically contained within a legitimate program is known asa. Worm. Macro. Trojan. Spartan.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
True or false you can use Facebook live feed tool to broadcast content as you post it
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
What is the motion of a wave described as?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Brian has a list of customers that needs to be entered into a new database. Before Brian can begin entering records into a database, he must first A. create objects for the database. B. create a table. C. enter information into an Excel spreadsheet. D. create a form to display the customer’s information.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
What are the two types of formulas in excel
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Word allows the user to view a document in different ways. What view would you choose to view a document like a book?a. View Mode b. Print Layout c. Read Mode d. Web Layout
« Previous
Page 37
Next »