menu
QAmmunity.org
Recent questions in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions in Computers and Technology
Input and output streams are provided by What header file A) B) C) D)
Rude
asked
Dec 28, 2024
by
Rude
8.4k
points
Computers and Technology
high-school
1
answer
4
votes
63.6k
views
Explain three types of database models
Mike Murphy
asked
Dec 28, 2024
by
Mike Murphy
8.5k
points
Computers and Technology
high-school
1
answer
1
vote
79.7k
views
What setting forces users to change their password? a) minimum password age b) maximum password age c) password history d) account lockout
Nicksarno
asked
Dec 28, 2024
by
Nicksarno
8.8k
points
Computers and Technology
high-school
1
answer
4
votes
113k
views
A network requires at least two computers and a shared resource, such as a printer. true or false
Bgies
asked
Dec 28, 2024
by
Bgies
7.7k
points
Computers and Technology
high-school
1
answer
5
votes
223k
views
What is the first part of the copypasta in base64? A) SGVsbG8gd29ybGQh B) V2hhdCBpcyB0aGUgZmlyc3QgcGFydCBvZiB0aGUgY29weXJwYXN0YQ== C) UGxlYXNlIGhlbGxldHRlIQ== D) QmVzdCBJbiBUaGUgQmFzZTY0
WonderLand
asked
Dec 28, 2024
by
WonderLand
8.0k
points
Computers and Technology
high-school
1
answer
4
votes
227k
views
Examine this code: String str = ""One Fine Day"" ; String val = str.substring(4) ; System.out.println( val ); What does the fragment print?
Teh
asked
Dec 28, 2024
by
Teh
8.5k
points
Computers and Technology
high-school
1
answer
5
votes
225k
views
Security Controls and principles are important to understand and implement. Below you will find a list of security Principles. Identify three of the principles you would like to discuss with your classmates
Juan Alonso
asked
Dec 28, 2024
by
Juan Alonso
7.7k
points
Computers and Technology
college
1
answer
4
votes
199k
views
In modified boxplots, a data value is a(n) outlier if it is above Q3+(1.5)(IQR) or below Q1-(1.5)(IQR). A) Statistical anomaly. B) Deviation threshold. C) Extremity measure. D) Outlier boundary.
Jake Spracher
asked
Dec 28, 2024
by
Jake Spracher
8.0k
points
Computers and Technology
high-school
1
answer
5
votes
204k
views
What do all current Apple products use as a power connector?
Meril
asked
Dec 28, 2024
by
Meril
8.4k
points
Computers and Technology
high-school
1
answer
3
votes
81.7k
views
......allows you to perform certain activities on screen such as clicking a button and placing the cursor at a specific location
Uerceg
asked
Dec 28, 2024
by
Uerceg
7.8k
points
Computers and Technology
high-school
1
answer
5
votes
174k
views
We want to find out the names of all the employees and their managers. Select EMPLOYEE, MANAGER FROM employee e, employee m WHERE e.manager_ssn= ?
Jan Wrobel
asked
Dec 28, 2024
by
Jan Wrobel
9.1k
points
Computers and Technology
high-school
1
answer
3
votes
203k
views
After using the Shadow/Highlight command to correct an underexposed image, which value determined the scale size for corrections?
RRR
asked
Dec 28, 2024
by
RRR
7.7k
points
Computers and Technology
high-school
1
answer
4
votes
216k
views
Suppose you want to interchange the values stored in memory cells 100 and 200. What is wrong with the following sequence of steps: Step 1. Move the contents of cell number 100 to cell number 200. Step
Sumit Sonawane
asked
Dec 28, 2024
by
Sumit Sonawane
7.9k
points
Computers and Technology
high-school
1
answer
1
vote
43.9k
views
Describe two situations in which you could create workbooks to store and calculate data
Nahuel Fouilleul
asked
Dec 28, 2024
by
Nahuel Fouilleul
8.0k
points
Computers and Technology
high-school
1
answer
4
votes
60.1k
views
An administrator would like to check if the Amazon CloudFront identity they created is making access API calls to an S3 bucket where a static website is hosted. Where can this information be obtained?
Ganj Khani
asked
Dec 28, 2024
by
Ganj Khani
7.7k
points
Computers and Technology
high-school
1
answer
0
votes
80.0k
views
What does POST stand for in the Travel Motivation POST scheme?
Markling
asked
Dec 28, 2024
by
Markling
8.7k
points
Computers and Technology
high-school
1
answer
4
votes
226k
views
What Quality Control tool would be used to evaluate blur?
Paruvelly Vishwanath
asked
Dec 28, 2024
by
Paruvelly Vishwanath
8.1k
points
Computers and Technology
high-school
1
answer
0
votes
83.3k
views
Write an explicit function to describe the sequence. a) f(n) = -16 - 3n b) f(n) = -16 - 3n + 3 c) f(n) = -16 + 3n d) f(n) = -16 - n/3
Demux
asked
Dec 28, 2024
by
Demux
8.6k
points
Computers and Technology
high-school
1
answer
3
votes
194k
views
Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user's system? a) DDos and Derive-by Downloads b) Malware & Malvertising c) Phishing and Password attacks d)
Trajchevska
asked
Dec 28, 2024
by
Trajchevska
7.9k
points
Computers and Technology
high-school
1
answer
2
votes
153k
views
The safe off-site use of portable devices such as smart phones can be accomplished by what?
Inkblot
asked
Dec 28, 2024
by
Inkblot
8.1k
points
Computers and Technology
high-school
1
answer
3
votes
83.8k
views
Page:
1
2
3
4
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
What is .725 as a fraction
Compare and contrast an electric generator and a battery??
What goal of the constitution was also a goal of the Magna Carta?
is it true or false that after the american revolution conflicts in the northwest territory erupted between remaining british soldiers and native americans
Search QAmmunity.org