Sign In
Ask Question
Computers and Technology
Camila Douglas
The Internet is best compare to
Answer
Answers (1)
Computers and Technology
Sebastian Foley
A network admin configures a static route on the edge router of a network to assign a gateway of last resort (the router that connects to the internet/ISP) ... How would they configure the edge router to automatically share this route using RIP?
Answer
Answers (1)
Computers and Technology
Scarlet Guerra
Your hard disk was partitioned in such a way that each cluster is 32KB. There was originally a file on the system that occupied seven clusters, but it was erased. The OS has now reclaimed one of those clusters with a 610 byte file. How would you best describe that particular cluster now? (For the purposes of this question, ignore binary calculations.)
Answer
Answers (1)
Computers and Technology
Righty
Which format is used for audio files?
avi
jpg
ogg
xml
Answer
Answers (1)
Computers and Technology
Amiyah Cross
To move an icon, you right-click it and select "Pin to start menu." True False
Answer
Answers (2)
Computers and Technology
Sharon
What information would be included in the data portion of an ethernet frame on an ip network?
Answer
Answers (1)
Computers and Technology
Isabella Dyer
Where's the space key again
Sorry I forgot
I'm so inbarest sorry
In my computer
Answer
Answers (1)
Computers and Technology
Richard Copeland
Give an example of movies or games that use teleportation
Answer
Answers (1)
Computers and Technology
Isiah Davidson
Write a loop that prints each country's population in country_pop. Sample output with input:
United States has 318463000 people.
India: 1247220000
Indonesia: 252164800
China: 1365830000
1. country_pop = {
2. 'China': 1365830000
3. 'India': 1247220000
4. 'United States': 318463000
5. 'Indonesia': 252164800
6. } # country populations as of 2014
7
8. print (country, 'has', pop, 'people.')
Answer
Answers (1)
Computers and Technology
Crawford
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above
Answer
Answers (1)
Computers and Technology
Yair
Which network service would you use to get the ip address from the fqdn hostname?
Answer
Answers (1)
Computers and Technology
Talon Santiago
Your employer gives you a list of all chemicals in the entire building and the location of the SDS collection, and he asks you to sign off that you completed the safety training program. What else is required of an employer training program?
Select all that apply.
SDS interpretation
Training for Chemical Handling in your area
PPE needed for work area
Physical and health hazard information for the chemicals in your work area.
Answer
Answers (1)
Computers and Technology
Jamal Lopez
Instructions Write a program that allows the user to enter the last names of five candidates in a local election and the number of votes received by each candidate. The program should then output each candidate's name, the number of votes received, and the percentage of the total votes received by the candidate. Your program should also output the winner of the election. A sample output is: Candidate Votes Received % of Total Votes Johnson 5000 25.91 Miller 4000 20.73 Duffy 6000 31.09 Robinson 2500 12.95 Ashtony 1800 9.33 Total 19300 The Winner of the Election is Duffy
Answer
Answers (1)
Computers and Technology
Guest
What is an electronic path over which data can travel.
Answer
Answers (1)
Computers and Technology
Justice Bishop
You are told to press one button if you see a pleasant word or a child, and a different button if you see an unpleasant word or an old person. Then the pairings reverse. What test is this?
Answer
Answers (1)
More
1
...
91
92
93
94
95
...
Home
»
Computers and Technology
» Page 93
Sign In
Sign Up
Forgot Password?