SantabeHub
Home
Search
Search
Computers And Technology Questions
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate projected growth. Which three types of information should be used to plan for network growth? (Choose three.)A. human resource policies and procedures for all employees in the companyB. documentation of the current physical and logical topologies *C. analysis of the network traffic based on protocols, applications, and services used on the network*D. history and mission statement of the companyE. inventory of the devices that are currently used on the network*F. listing of the current employees and their role in the company
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Which of the following statements is true?a. Old paper documents, which were previously only available offline, are increasingly being imported and becoming available on the Internet.b. Information that may not be retrievable today may be retrievable tomorrow due to changes in terms of service, public policy, law, and technical privacy settings.c. Improvements in searching techniques enable search engines to gather information from, and make meaningful connections between, a greater number of data sources.d. All of the above
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
What invention during the renaissance period enabled people to purchase music for their own personal use?a. electronic recording devicesb. instruments for trained transcription workersc. printing pressd. faster delivery service
COMPUTERS AND TECHNOLOGY
COLLEGE
How many rules are contained in the css code?a.1b.2c.3d.4
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Landon starts his computer and receives the error message, "Hard drive is not found." In a panic, he calls you because he did not back up his data and has numerous important files on his hard drive. During your investigation, Landon tells you he was watching a movie on his computer the previous night. What might be the problem with Landon’s computer?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
The most recent subfield of the quantitative perspective is _____, which is reflected in management information systems designed to provide relevant information to managers in a timely and cost-efficient manner. a. operations research b. infrastructure development c. information technology d. systems thinking e. operations management
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
A meeting of the quality team June is nervous about suggesting ideas because he is not sure he understands why they are qualified problems what would help June use positive workplace behaviors in the meetings
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very nice ones. She decided she was going to set up a tie store on her campus and offer sports themed ties as well as solid colored ties in her school colors. She can put an announcement on the school’s monitors that would display in the dining halls and student union. Which of the following should Haya consider during her first month of operation? a. A sales force automation system b. A customer interaction center c. Bundling d. Campaign management e. Purchasing profiles
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
What kind of programming language allows you to use a vocabulary of reasonable terms such as "read," "write," or "add" instead of the sequence of on/off switches that perform these tasks?
COMPUTERS AND TECHNOLOGY
COLLEGE
Residential and business customers are paying different rates for water usage. Residential customers pay $0.005 per gallon for the first 6000 gallons. If the usage is more than 6000 gallons, the rate will be $0.007 per gallon after the first 6000 gallons. Business customers pay $0.006 per gallon for the first 8000 gallons. If the usage is more than 8000 gallons, the rate will be $0.008 per gallon after the first 8000 gallons. For example, a residential customer who has used 9000 gallons will pay $30 for the first 6000 gallons ($0.005 * 6000), plus $21 for the other 3000 gallons ($0.007 * 3000). The total bill will be $51. A business customer who has used 9000 gallons will pay $48 for the first 8000 gallons ($0.006 * 8000), plus $8 for the other 1000 gallons ($0.008 * 1000). The total bill will be $56. Write a program to do the following. Ask the user which type the customer it is and how many gallons of water have been used. Calculate and display the bill.
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
Find the error in the following pseudocode. Module main () Call raiseToPower (2, 1.5) End Module Module raiseToPower (Real value, Integer power) Declare Real result Set result=value^power Display result End Module
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
Miguel’s boss asks him to distribute information to the entire staff about a mandatory meeting. What should he do?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Consider the following code snippet: String[] data = { "abc", "def", "ghi", "jkl" }; String [] data2; In Java 6 and later, which statement copies the data array to the data2 array?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system, hosted at the vendor's site, using a webbrowser. Which service delivery model is Kaira's company using?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Declare and initialize the following variables: monthOfYear, initialized to the value 11 companyRevenue, initialized to the value 5666777 firstClassTicketPrice, initialized to the value 6000 totalPopulation, initialized to the value 1222333
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
You’re writing a script that will be called by other scripts. You want to signal abnormal termination of your script by passing a value of 8 to the external script under some circumstances. What command can you use in your own script to do this?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
A user has been given Full Control permission to a shared folder. The user has been given Modify permission at the NTFS level to that folder and its contents. What is that user’s effective permissions to that folder when they access it through the shared folder from another computer?
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Which of the following are considered transactions in an information system?1) money deposited in a bank account2) student recording her answer to a question in an online test3) customer adding an item to the online shopping cartSelect one:a) 1 and 3 onlyb) 1 onlyc) All of themd) None of them
« Previous
Page 90
Next »