Sign In
Ask Question
Computers and Technology
Richard Caldwell
Which game would be classified as an educational game?
Answer
Answers (1)
Computers and Technology
Guest
Similarities between human and computer
Answer
Answers (1)
Computers and Technology
Austin Boone
Which channel are twisted cables used in
Answer
Answers (1)
Computers and Technology
Big Foot
What device sends signals from a computer onto a network?
Transceiver
Cable
Gateway
Router
Answer
Answers (1)
Computers and Technology
Nathaniel Raymond
On which servers should the port for SMTP be open?
Domain controllers
Email servers
File servers
Web servers
Answer
Answers (1)
Computers and Technology
Breanna Huerta
What elements are needed in a workstation domain policy regarding use of antivirus and malicious software prevention tools?
Answer
Answers (1)
Computers and Technology
Shawn Bishop
To make a profit, the prices of the items sold in a furniture store are marked up by 80%. After marking up the prices, each item is put on sale at a discount of 10%. Design an algorithm to find the selling price of an item sold at the furniture store. What information do you need to find the selling price?
Answer
Answers (1)
Computers and Technology
Korbin Combs
You have several marketing documents that are published through AD RMS. However, you have three new marketing employees that require additional training before they should be able to access these documents. These employees should have all other rights and permissions as members of the Marketing group. What should you do to prevent these users from accessing these rights-protected documents?
Answer
Answers (1)
Computers and Technology
Tyrone Curry
If you are working on a document and want to have Word automatically save the document every minute, what steps should you use to find that setting so you can adjust it?
Answer
Answers (1)
Computers and Technology
Armanti
Can you use a fake name on mailing address
Answer
Answers (1)
Computers and Technology
Kylie Mata
When a person develops tolerance for alcohol he or she will
Answer
Answers (1)
Computers and Technology
Amaris Davies
1.7 If a 500 MHz machine takes one clock cycle to fetch and execute an instruction, then what is the instruction execution rate of the machine?
1.8 How many instructions could the above machine execute in one minute?
1.9 Let's suppose we have a 40-year-old computer that has an instruction execution rate of one thousand instructions per second. How long would it take in days, hours, and minutes to execute the same number of instructions you derived for the 500 MHz machine?
Answer
Answers (1)
Computers and Technology
Jordyn Ewing
Which of the following cryptographic attack refers to extraction of cryptographic secrets (e. g. the password to an encrypted file) from a person by coercion or torture?
Ciphertext-only Attack
Chosen-ciphertext Attack
Adaptive Chosen-plaintext Attack
Rubber Hose Attack
Answer
Answers (1)
Computers and Technology
Nathalie Henderson
When you collaborate or meet with a person or group online, it is called
1. cloud computing
2. social networking
3. text messaging
4. web conferencing
Answer
Answers (1)
Computers and Technology
Dilly Dally
Which topology connects all the computers in a circular pattern?
A. mesh topology
B. ring topology
C. star topology
star topology
D. bus topology
Answer
Answers (1)
More
1
...
192
193
194
195
196
...
Home
»
Computers and Technology
» Page 194
Sign In
Sign Up
Forgot Password?