menu
QAmmunity.org
Recent questions and answers in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Register
Recent questions and answers in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions and answers in Computers and Technology
The language {aⁿ bⁿ cⁿ : n ≥ 0} is context free false true
Popo
answered
Jan 4
by
Popo
8.2k
points
Computers and Technology
high-school
1
answer
1
vote
90.6k
views
Process to remove information from media such that information recovery is not possible. It includes removing all labels, markings, and activity logs. A) Data Encryption B) Data Wiping C) Data Redaction
Mpd
answered
Jan 4
by
Mpd
7.4k
points
Computers and Technology
high-school
1
answer
2
votes
121k
views
Write a script that counts how many times a user tries to quit the program with an interrupt (typically Control-C), showing the count and finally letting them quit on the fifth attempt. Tip: You'll need
ZeppRock
answered
Jan 4
by
ZeppRock
8.1k
points
Computers and Technology
high-school
1
answer
1
vote
185k
views
Code Practice For this lesson, you will come up with your own challenging algorithm for other students to trace. It must contain at least 5 if statements and use at least one AND or OR boolean condition.
Majkel
answered
Jan 4
by
Majkel
8.2k
points
Computers and Technology
high-school
1
answer
1
vote
75.1k
views
Within the Account Actions, you have the following options: Adding an Account or Linking Accounts. True or False?
Brazeredge
answered
Jan 4
by
Brazeredge
7.8k
points
Computers and Technology
high-school
1
answer
3
votes
180k
views
When installing a new monitor, what should you do first? (Choose the best answer.) a. Determine what type of cable is compatible with your video card. b. Go to the advanced dialog screen and choose a resolution.
Think Nice Things
answered
Jan 4
by
Think Nice Things
8.3k
points
Computers and Technology
high-school
1
answer
3
votes
51.4k
views
Arrange the logging keywords from 0-7: a. Emergencies b. Alerts c. Critical d. Errors e. Warnings f. Notifications g. Informational h. Debugging
Jase Whatson
answered
Jan 4
by
Jase Whatson
7.7k
points
Computers and Technology
high-school
1
answer
1
vote
152k
views
Answer the analyze charts question on p. 178, analyze political cartoons question on p. 179, analyze map question on p. 180, analyze information question on p. 182, and analyze maps question on p. 183.
Daniel Reis
answered
Jan 4
by
Daniel Reis
7.4k
points
Computers and Technology
high-school
1
answer
0
votes
200k
views
As of December 31, customers owe us $15,000 for landscaping services we completed in December, but they won't pay until January 3. At January 3 we received $15,000. Give the journal entry to account for
ZoomIn
answered
Jan 4
by
ZoomIn
8.0k
points
Computers and Technology
high-school
1
answer
2
votes
3.7k
views
How do you undo your staging of changes in Git? A. git reset HEAD B. git commit --amend C. git revert HEAD D. git checkout
Kartins
answered
Jan 4
by
Kartins
7.6k
points
Computers and Technology
high-school
1
answer
5
votes
32.9k
views
What setting forces users to change their password? a) minimum password age b) maximum password age c) password history d) account lockout
Jvenezia
answered
Jan 4
by
Jvenezia
8.3k
points
Computers and Technology
high-school
1
answer
4
votes
113k
views
a company has multiple research departments that have deployed several resources to the aws cloud. the departments are free to provision their own resources as they are needed. to ensure normal operations,
Seth Spearman
answered
Jan 4
by
Seth Spearman
8.3k
points
Computers and Technology
high-school
1
answer
0
votes
120k
views
Which security architecture model is based on the premise that higher levels of integrity are more worthy of trust than lower ones. a. Clark-Wilson b. Bell-LaPadula c. Common Criteria d. Biba
Anand Pandey
answered
Jan 4
by
Anand Pandey
8.6k
points
Computers and Technology
high-school
1
answer
0
votes
230k
views
The safe off-site use of portable devices such as smart phones can be accomplished by what?
Diane
answered
Jan 4
by
Diane
7.1k
points
Computers and Technology
high-school
1
answer
3
votes
83.8k
views
What happens when a trusted computing base (TCB) failure occurs as a result of a lower-privileged process trying to access restricted memory segments? A) Administrator intervention is required. B) The
Rahul Vig
answered
Jan 4
by
Rahul Vig
8.2k
points
Computers and Technology
high-school
1
answer
4
votes
90.3k
views
What policy is designed to ensure that all confidential or sensitive materials, either in paper form or electronic, are removed from a user's workspace and secured when the items not in use or when employees
Guy Nesher
answered
Jan 4
by
Guy Nesher
8.3k
points
Computers and Technology
high-school
1
answer
2
votes
142k
views
Which of the following is not an example of an illustration that can be inserted in an Excel worksheet? a- pictures from file b- online pictures c- clip mart d- shapes
Simone
answered
Jan 4
by
Simone
7.6k
points
Computers and Technology
high-school
1
answer
5
votes
221k
views
What is the purpose of refining or addressing product recommendations? 1) To improve customer satisfaction 2) To increase sales 3) To reduce product returns 4) All of the above
Dan Chase
answered
Jan 4
by
Dan Chase
8.3k
points
Computers and Technology
high-school
1
answer
4
votes
112k
views
When does the tracking code send an event hit? 1) every time a user performs an action with event tracking implemented 2) every time a user performs an action with pageview tracking implemented 3) every
Luchy
answered
Jan 4
by
Luchy
7.7k
points
Computers and Technology
high-school
1
answer
4
votes
161k
views
A workgroup is a group of interconnected computers that share each other's resources without relying on a central ____.
Rajesh Omanakuttan
answered
Jan 4
by
Rajesh Omanakuttan
9.6k
points
Computers and Technology
high-school
1
answer
4
votes
80.7k
views
To see more, click for all the
questions in this category
.
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.0m
questions
11.7m
answers
Search QAmmunity.org