SantabeHub
Home
Search
Search
Computers And Technology Questions
COMPUTERS AND TECHNOLOGY
COLLEGE
A data structure used to bind an authenticated individual to a public key is the definition of ________. digital certificate baseline internet layerdata link layer
COMPUTERS AND TECHNOLOGY
COLLEGE
When applying scenario logic to technology commercialization we should not consider if there is enough social, political, and market support for commercialization to take place Select one: True False
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
Select the correct answer.Thomas made use of bright and glaring font colors for his website. How does this practice affect the core message of the website?A. confuses usersB. effectively brings out the core messageC. engages the users furtherD. distracts the users from the core message
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Which of the following statements is FALSE? A. Security is a huge concern for nearly all organizations with private or proprietary information about clients, customers, and employees. B. New controls in e-mail programs can ensure that your e-mail will remain private, both within your organization's server and at the receiver's end as well. C. When writing e-mails, avoid jargon and slang, use formal titles, use formal e-mail addresses for yourself, and make your message concise and well-written. D. Lack of visual and vocal cues in e-mails means emotionally positive messages, like those including praise, will be seen as more emotionally neutral than the sender intended. E. Face-to-face communication provides the highest degree of message channel richness.
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
If you see someone harassing someone else online you should
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
Which evaluation factor will be most important when choosing technology for the company
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open or poorly configured firewall will not help the network defender minimize the risk from attack. True or false?
COMPUTERS AND TECHNOLOGY
COLLEGE
Create a Produceclass that hasan instance variable of type Stringfor the name, appropriate constructors, appropriate accessor and mutator methods, and a public toString() method. Then create a Fruitand a Vegetableclass that are derived from Produce. These classes should have constructors that take the nameas a Stringand invoke the appropriate constructor from the base class to set the name.Also, they should override toStringmethod to display the nameof the produce and its type. For instance, Mangois a Fruitand Caulifloweris a Vegetable. Finally, create a class called TruckOfProducethat will keep track of the boxes of Vegetablesand Fruitsadded in to the truck. This class should use an array of Produceto store both Vegetableand Fruitobjects.
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
HELP PLIS !!!!!! I AM BEGGING ITS A UNIT TEST WILL GIVE 50 points! if rightWhich combination of options is the keyboard shortcut to access the Find dialog box and search a worksheet for particular values? Ctrl+H Ctrl+RCtrl+FCtrl+E......................................In addition to the format commands that are found in the ribbon, which option is available for more extensive formatting?Fix Cells dialog boxFormat Cells dialog boxFormat dialog boxQuick Access tool bar.....................................Donte needs to print specific sections in the workbook, as opposed to the entire workbook. Which feature should he use?Page SetupBackstage viewPrint AreaOption.......................................Which keyboard shortcut will create a hyperlink in an Excel document?Ctrl+FCtrl+HCtrl+KCtrl+End.......................................Which key(s) will launch the Spelling Checker dialog box?F8F7Ctrl+H F2..........................................Which character will always precede an Excel formula? +!=/=........................................Where are commonly accessed commands located by default in Excel 2016?status barView tabsearch fieldQuick Access tool bar........................................Nick has chosen to hide a worksheet that contains sensitive data when presenting information from his workbook. Which statement is correct?The worksheets that are hidden will retain data, but references to those worksheets will no longer function.The worksheets that are hidden will have their data removed.The worksheets that are hidden will retain their data, and references will continue to function as normal You will have to unhide the worksheets to make references function correctly. ........................................Which setting is used to determine the order of printing pages?Collation SettingsOrientation SettingsMargin SettingsScaling Settings
COMPUTERS AND TECHNOLOGY
COLLEGE
Broker Ray is closely acquainted with the Subdivision Heights neighborhood of his town. Over the year, Ray has made it a practice to contact homeowners in person and also to send them quarterly mailings. This method of finding listings is known as:
COMPUTERS AND TECHNOLOGY
COLLEGE
How do you suppose the Anagram Server works?
COMPUTERS AND TECHNOLOGY
COLLEGE
Express 278910 in binary – Use the technique of subtracting powers of 2
COMPUTERS AND TECHNOLOGY
COLLEGE
what are "open source" programming language? Give examples of open source languages. Discuss the pros and cons of open source language.
COMPUTERS AND TECHNOLOGY
COLLEGE
Write an application that calculates and displays the amount of money a user would have if his/her money could be invested at 5% interest for one year. Create a method that prompts the user for the starting value of the investment and returns it to the calling program. Call a separate method to do the calculation and return the result to be displayed. Save the program as Interest.java
COMPUTERS AND TECHNOLOGY
COLLEGE
A common measure of transmission for digital data is the number of bits transmitted per second. Generally, transmission is accomplished in packets consisting of a start bit, a byte (8 bits) of information, and a stop bit. Using these facts, answer the following:a. Compute the time required to transmit an image of 1200x800 pixels with 8 bits for gray of each pixel using a 50 M bits/sec. modem?b.What would the time be at 3 M bits/sec, a representative of download speed of a DSL connection?(c) Repeat a and b when the image is RGB colored with 8 bits for each primary color. f 20 colored frames per second
COMPUTERS AND TECHNOLOGY
COLLEGE
Employee names are stored using a maximum of 50 characters. This information is an example of which of the following?Meta-dataRecord instanceData modelData retrieval
COMPUTERS AND TECHNOLOGY
HIGH SCHOOL
Given the int variables x, y, and z, write a fragment of code that assigns the smallest of x, y, and z to another int variable min. Assume that all the variables have already been declared and that x, y, and z have been assigned values.
COMPUTERS AND TECHNOLOGY
MIDDLE SCHOOL
Discuss hard disk storage system.
« Previous
Page 93
Next »