SantabeHub
Home
Search
Search
Computers And Technology Questions
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
During which phase of a hacker's five-step approach does the hacker scan a network to identify IP hosts, open ports, and services enabled on servers and workstations?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
The therapist's feeling of respect and affection for the client that exists without any strings attached, no matter what the client may do or say, is called ____________.
COMPUTERS AND TECHNOLOGY
COLLEGE
Obtain the 9’s complement of the following eight-digit decimal numbers:1234987689009951
COMPUTERS AND TECHNOLOGY
COLLEGE
To define constructors and member functions outside of a class's original scope, the operator can be used.
COMPUTERS AND TECHNOLOGY
COLLEGE
Decode the following string of hex numbers using the ASCII code:0x540x680x65 0x630x610x6b0x65 0x690x73 0x61 0x6c0x690x650x2e
COMPUTERS AND TECHNOLOGY
COLLEGE
The scope of a variable declared inside of a function is:a) Local - within that functionb) Within that file onlyc) global
COMPUTERS AND TECHNOLOGY
COLLEGE
Once a device has failed, what metric measures the average amount of time to repair?a.mean field replacement time (MFRT)b.mean time to repair (MTTR)c.mean time to restore (MTTR)d.mean restoration time (MRT)
COMPUTERS AND TECHNOLOGY
COLLEGE
_________ is a business strategy in which a company purchases its upstream suppliers to ensure that its essential supplies are available as soon as the company needs them.The bullwhip effectVertical integrationJITVMI
COMPUTERS AND TECHNOLOGY
COLLEGE
What component can be used for user input or display of output?JButtonJLabelJTextFieldJFrame
COMPUTERS AND TECHNOLOGY
COLLEGE
. One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is to:A. report which device drivers a computer usesB. determine which ports are open on a computerC. report the status of individual computer usersD. determine which operating system is running on a computer
COMPUTERS AND TECHNOLOGY
COLLEGE
Object-oriented programming allows you to derive new classes from existing classes. This is calledcomposition.interfaces.inheritancepolymorphism
COMPUTERS AND TECHNOLOGY
COLLEGE
Before a structure can be used, it must beA. declaredB. deallocatedC. initializedD. All of the above
COMPUTERS AND TECHNOLOGY
COLLEGE
)when you classify data into groups and subgroups you are using a(n) ____ order?A. CircularB. HierarchicalC. LinearD. Group
COMPUTERS AND TECHNOLOGY
COLLEGE
What suggestions do you have for preventing scope creep in projects?
COMPUTERS AND TECHNOLOGY
COLLEGE
The scope of a variable declared inside of a function is:a) Local - within that functionb) Within that file onlyc) global
COMPUTERS AND TECHNOLOGY
COLLEGE
A device that protects electronic equipment from an increase in power, but not a decrease or outage is a ___.a. Battery backupb. Surge suppressorc. CRTd. UPS
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
The elements of an integer-valued array can be set to 0 (i.e., the array can be cleared) recursively as follows: An array of size 0 is already cleared; Otherwise, set the last of the uncleared elements of the array to 0, and clear the rest of the array Write a void method named clear that accepts an integer array, and the number of elements in the array and sets the elements of the array to 0.
COMPUTERS AND TECHNOLOGY
COLLEGE
Write a function named "read_json" that takes a JSON formatted string as a parameter and return the data represented by the input in the appropriate types for this language. For example, if the input string represents a JSON object you should return a key-value store containing the same data?
« Previous
Page 86
Next »