Sign In
Ask Question
Computers and Technology
Jayden Santana
Which of the following functions does a browser perform?
a. Links you to the Web
b. Finds sites devoted to a particular subject
c. Automates data calculation
d. Automatically saves a copy of your e-mail
Answer
Answers (1)
Computers and Technology
Cristofer
Assume there is a variable, h already assigned a positive integer value. Write the code necessary to assign its square to the variable g. For example, if h had the value 8 then g would get the value 64.
Answer
Answers (1)
Computers and Technology
Francis
The IT director asks you to set up a system that will encrypt credit card data. She wants you to use the most secure symmetric algorithm with the least amount of CPU usage. Which of the following algorithms should you select? a. SHA-1
b. AES
c. RSA
d. 3DES
Answer
Answers (1)
Computers and Technology
Guest
Waht is the difference between authorization and access control? Access control specifies what a user can do, and authorization enforces what a user can do Access control proves a user's identify and authorization creates a log of their activities Authorization specifies what a user can do, and access control enforces what a user can do Authorization proves a user's identify and access control creates a log of their activities
Answer
Answers (2)
Computers and Technology
Guest
Technician A says in computer language a 0 or 1 is called a bit. Technician B says in computer language a 0 or 1 is called a byte. Who is right?
Answer
Answers (1)
Computers and Technology
Laurel Fuller
A word-processing document is a piece of software.
Answer
Answers (1)
Computers and Technology
Lauryn Downs
During email encryption, the system creates which type of key to allow the user to send an encrypted email?
A.
personal key
B.
public key
C.
private key
D.
secret key
Answer
Answers (2)
Computers and Technology
Justine Mckee
Which computer network component allows data transfers from one computer to another through a telephone line?
Answer
Answers (1)
Computers and Technology
Jaime Michael
With only a floor plan to reference, the designer would know what about a window?
Answer
Answers (1)
Computers and Technology
Bender
If you wanted the item that cost the least at the top of the table, you would sort in descending order
Answer
Answers (1)
Computers and Technology
Tyler Pacheco
If when I evaluate the security readiness of a web server I find an issue in the code that might allow an SQL injection attack, what InfoSec term describes this development?
Answer
Answers (1)
Computers and Technology
Guest
Explain how you would tell the difference between a safe sure and an unsafe site
Answer
Answers (1)
Computers and Technology
Westie
Write a program in Python that reads in investment amount, annual interest rate, and number of years, and displays the future investment value using the following formula:and displays the future investment value using the following formula:futureInvestmentValue = investmentAmount * (1 + monthlyInterestRate) numberOfYears*12
Answer
Answers (1)
Computers and Technology
Aleena Pugh
17. When an industrial electrical circuit requires a 220 VAC single phase power supply, the electric power supply circuit is normally taken from
O A. a separate transformer feed.
O B. a single phase of a three-phase system and a ground wire.
O C. two of the three power feeds in a three-phase system.
O D. phase A of a delta connected to the neutral tap on windings B and C.
Answer
Answers (1)
Computers and Technology
Cristian Chang
Authorization is a set of rights defined for a subject and an object. They are based on the subject's identity. a. Trueb. False
Answer
Answers (1)
More
1
...
172
173
174
175
176
...
Home
»
Computers and Technology
» Page 174
Sign In
Sign Up
Forgot Password?