SantabeHub
Home
Search
Search
Computers And Technology Questions
COMPUTERS AND TECHNOLOGY
COLLEGE
Numbers are calculated in Excel using formulas and ______.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
The major advantage of ________ is its simplicity and its freedom from assumptions about the expected input to any program, service, or function.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
What will the following code display? dct = {'January':1, 'February':2, 'March':3} print(dct['February'])
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
A trusted system is a system that can be expected to meet user requirements for reliability, security, and effectiveness because of what? a) Frequent updates b) Regular maintenance c) Built-in redundancies d) Vendor support
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
What does the word tolerance mean in textiles?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Certificates of indebtedness sold to raise long-term funds for a corporation or government agency are known as _____
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
What does IP stand for (as in IP address)? Also, what is overtype mode?
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
How do we call a very small video,that is repeating unlimitedely
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
What does an arrow next to a menu item indicate?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
In Vista and Windows 7, the Appearance and Personalization option allows you to change theA. keyboard speed. B. small icons. C. background. D. mouse properties.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
The file manager used in Microsoft Windows is
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Powerpoint displays many that are varied and appealing and give you an excellent start at designing a presentation
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
By working in a series of positions with increasing responsibilities, the owner of Stonegate Gardens has built her interest in flowers and plants into _____.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Groups that deteriorate over time move into a stage known asa. deteriorating b. adjourning c. declining d. maturing e.disbanding
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Before using your Twitter account to market your personal brand, you should evaluate Your profile picture Your bio Your tweets All of the above
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
____ is a font that resembles the letters that typewriters produced.
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
An malicious attempt to acquire sensitive data like usernames, passwords, and credit card information using email is called?a. Trojan b. Virus c. Phishing d. Hopscotch
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
A quarterback takes a hard hit and is carried off the field on a stretcher. Why might he have a better chance of recovery than quarterbacks of previous generations?
« Previous
Page 45
Next »