menu
QAmmunity.org
Recent questions in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Register
Recent questions in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions in Computers and Technology
Security Controls and principles are important to understand and implement. Below you will find a list of security Principles. Identify three of the principles you would like to discuss with your classmates
Juan Alonso
asked
Dec 28, 2024
by
Juan Alonso
6.8k
points
Computers and Technology
college
1
answer
4
votes
199k
views
We want to find out the names of all the employees and their managers. Select EMPLOYEE, MANAGER FROM employee e, employee m WHERE e.manager_ssn= ?
Jan Wrobel
asked
Dec 28, 2024
by
Jan Wrobel
8.1k
points
Computers and Technology
high-school
1
answer
3
votes
203k
views
Suppose you want to interchange the values stored in memory cells 100 and 200. What is wrong with the following sequence of steps: Step 1. Move the contents of cell number 100 to cell number 200. Step
Sumit Sonawane
asked
Dec 28, 2024
by
Sumit Sonawane
7.0k
points
Computers and Technology
high-school
1
answer
1
vote
43.9k
views
What does POST stand for in the Travel Motivation POST scheme?
Markling
asked
Dec 28, 2024
by
Markling
7.7k
points
Computers and Technology
high-school
1
answer
4
votes
226k
views
You are required review the concepts battery energy storage and energy aggregation. Expected: cite recent UK grid storage schemes, to include battery types and scheme energy capacity, aggregation processes
Levvy
asked
Dec 28, 2024
by
Levvy
7.6k
points
Computers and Technology
college
1
answer
2
votes
109k
views
The purpose of the system investigation phase is to _______________. a. define what the information system must do to solve the problem or capitalize on the opportunity b. gain a clear understanding of
Tomsseisums
asked
Dec 28, 2024
by
Tomsseisums
6.7k
points
Computers and Technology
high-school
1
answer
0
votes
20.4k
views
If the "limit n" clause is not provided as part of an SQL command, all the rows of the table will get displayed. True
Rudramuni TP
asked
Dec 28, 2024
by
Rudramuni TP
7.1k
points
Computers and Technology
college
1
answer
3
votes
179k
views
How to create rest api in express js
Eldar
asked
Dec 28, 2024
by
Eldar
7.1k
points
Computers and Technology
high-school
1
answer
1
vote
187k
views
Identify two ways in which you can display a message to a user while using table-based lookups for an attribute. A. defining an advanced BML (BigMachines Language) function for that attribute B. setting
Quv
asked
Dec 28, 2024
by
Quv
7.4k
points
Computers and Technology
high-school
1
answer
4
votes
33.3k
views
true/false. a system-wide example of this is total quality management. this type of change affects performance appraisal and rewards, decision-making, and communication and information-processing systems.
Nathan Garabedian
asked
Dec 28, 2024
by
Nathan Garabedian
7.8k
points
Computers and Technology
college
1
answer
4
votes
78.8k
views
using multisim with screen shots Part 8: Create a separate schematic using your newly created 4 bit adder with carry. Verify the operation using at least 4 different input test cases. In at least two test
Skrew
asked
Dec 28, 2024
by
Skrew
6.7k
points
Computers and Technology
college
1
answer
1
vote
88.7k
views
write a java program that will 1. welcome the user, 2. prompt the user to enter a name, 3. echo the name entered, 4. display the numbers 11 to 13 (inclusive) twice, as shown in the example, 5. thank the
BozoJoe
asked
Dec 28, 2024
by
BozoJoe
7.1k
points
Computers and Technology
high-school
1
answer
0
votes
134k
views
Which of the following is the best description of Assumed requirements? A. It's often stated that requirements are about what the system has to do, whereas how the solution will be implemented is the realm
Vincent Briglia
asked
Dec 28, 2024
by
Vincent Briglia
7.7k
points
Computers and Technology
high-school
1
answer
3
votes
37.8k
views
When to notify state for incidence with RAM?
Stacey
asked
Dec 28, 2024
by
Stacey
7.5k
points
Computers and Technology
high-school
1
answer
3
votes
233k
views
Which of the following is not true about cybersecurity? a.Recent data breaches have released personal information of hundreds of millions of people. b.Cybersecurity is the protection of computer systems,
Jim Morrison
asked
Dec 28, 2024
by
Jim Morrison
7.2k
points
Computers and Technology
high-school
1
answer
0
votes
229k
views
The requirement to keep information private or secret is the definition of __________.
Jaap Joris Vens
asked
Dec 28, 2024
by
Jaap Joris Vens
7.3k
points
Computers and Technology
high-school
1
answer
2
votes
33.8k
views
What technology is used to customized creatives to be served to website visitors?
Onepan
asked
Dec 28, 2024
by
Onepan
7.5k
points
Computers and Technology
college
1
answer
4
votes
204k
views
A system can be further divided into: a. system b. subsystem c. database d. accounting information system
Denisa
asked
Dec 28, 2024
by
Denisa
7.3k
points
Computers and Technology
high-school
1
answer
2
votes
27.3k
views
For Questions 3-5, consider the following code: stuff = [] stuff.append(1.0) stuff.append(2.0) stuff.append(3.0) stuff.append(4.0) stuff.append(5.0) print(stuff) 3. What data type are the elements in stuff?
Meng Lu
asked
Dec 28, 2024
by
Meng Lu
7.0k
points
Computers and Technology
college
1
answer
4
votes
127k
views
With the indexed sequential access method (isam), records cannot be accessed randomly.
Raushan Singh
asked
Dec 28, 2024
by
Raushan Singh
7.3k
points
Computers and Technology
high-school
1
answer
4
votes
120k
views
Page:
1
2
3
4
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
8.1m
questions
10.8m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
What is .725 as a fraction
Compare and contrast an electric generator and a battery??
What goal of the constitution was also a goal of the Magna Carta?
is it true or false that after the american revolution conflicts in the northwest territory erupted between remaining british soldiers and native americans
Search QAmmunity.org