menu
Qammunity.org
Recent questions in Computers & Tech
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers & Tech
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Recent questions in Computers & Tech
include the following on the plotticks on x- axis with all the years, to identify the years of recessionannotation for at least two years of recessiontitle as automobile sales during recessionclick here
Kevin Pimentel
asked
Dec 24, 2024
by
Kevin Pimentel
7.7k
points
Computers & Tech
high-school
1
answer
1
vote
149k
views
Do you know why a Security Gateway (ActiveGate) is used? a) To provide secure access to monitored environments b) To boost network performance c) To filter out malicious traffic d) To restrict access to
Yack
asked
Dec 24, 2024
by
Yack
8.4k
points
Computers & Tech
high-school
1
answer
4
votes
200k
views
Mary is considering a high speed internet connection for her new business. The connection, must work over existing phone lines in the building as they don't want to re-wire the entire network connection
Alan Tam
asked
Dec 24, 2024
by
Alan Tam
7.9k
points
Computers & Tech
high-school
1
answer
1
vote
178k
views
Create a new named tuple dog that has the attributes name, breed, and color.
Mahmudul Hasan Sohag
asked
Dec 24, 2024
by
Mahmudul Hasan Sohag
8.6k
points
Computers & Tech
high-school
1
answer
5
votes
173k
views
Integration of all functions into one software program in order to manage operations and inventory in a firm is known as __________ __________ __________.
Kartal
asked
Dec 24, 2024
by
Kartal
7.9k
points
Computers & Tech
high-school
1
answer
3
votes
125k
views
What is this? diagnose hardware sysinfo conserve a) Diagnose hardware conservation b) Display hardware conservation details c) Configure hardware conservation d) Enable hardware conservation
Jerry Wu
asked
Dec 24, 2024
by
Jerry Wu
8.5k
points
Computers & Tech
high-school
1
answer
2
votes
134k
views
A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ___. A. Botnet B. Zombie C. Compromised host D. Malware-infected system
Ymajoros
asked
Dec 24, 2024
by
Ymajoros
8.4k
points
Computers & Tech
high-school
1
answer
1
vote
159k
views
Fill in the blanks: Master files contain ___________. If you compare two records in the same master file, you find that the _________ are the same, but the ___________ can be different.
Julien May
asked
Dec 24, 2024
by
Julien May
8.3k
points
Computers & Tech
high-school
2
answers
5
votes
171k
views
Which Azure plans is the best fro business critical workloads?
Ali Sufyan
asked
Dec 24, 2024
by
Ali Sufyan
7.7k
points
Computers & Tech
high-school
1
answer
4
votes
110k
views
What are the tag attributes? give example
Abdulrazzaq Alzayed
asked
Dec 24, 2024
by
Abdulrazzaq Alzayed
8.0k
points
Computers & Tech
high-school
1
answer
1
vote
129k
views
Match each LSA type on the left with the appropriate description on the right: a. Describes a network that has a DR and BDR b. Describes a subnet in another area c. Describes an item from the drag region
Hpavc
asked
Dec 24, 2024
by
Hpavc
7.5k
points
Computers & Tech
high-school
1
answer
0
votes
219k
views
In which order-taking method are guest order recording and guest placement interconnected?
Dennis Winter
asked
Dec 24, 2024
by
Dennis Winter
8.7k
points
Computers & Tech
high-school
1
answer
3
votes
178k
views
How to get rid of spaces after text in excel
Carson Myers
asked
Dec 24, 2024
by
Carson Myers
8.1k
points
Computers & Tech
high-school
1
answer
4
votes
7.5k
views
With reference to content limitations, what content do we tend to 'block' when in NWC, which we have less control over compared to when in an ASC?
Makoto Miyazaki
asked
Dec 24, 2024
by
Makoto Miyazaki
7.2k
points
Computers & Tech
high-school
1
answer
2
votes
32.1k
views
Software that is installed often in special, read-only memory in devices like printers or communication devices is called ________. a) System Software b) Firmware c) Application Software d) Middleware
Cokegod
asked
Dec 24, 2024
by
Cokegod
7.9k
points
Computers & Tech
high-school
1
answer
1
vote
163k
views
IS THE READERSHIP REPRESENTED BY THE WEBSITE WHAT WE EXPECT? HOW DOES IT CHALLENGE STEREOTYPES?
Azizbekian
asked
Dec 24, 2024
by
Azizbekian
8.5k
points
Computers & Tech
high-school
1
answer
3
votes
105k
views
__________________ are intended to provide public key encryptions and would not cause an error during a vulnerability scan of a web server: using an untrusted CA, certificate expiration, and mismatched
CarpeNoctem
asked
Dec 24, 2024
by
CarpeNoctem
9.4k
points
Computers & Tech
high-school
1
answer
5
votes
15.8k
views
You want to set up a device as a firewall between your Internet communication and the workgroup switches on your network, and you have the option of the following: a workgroup hub, a repeater, an email
Alia Anis
asked
Dec 24, 2024
by
Alia Anis
8.2k
points
Computers & Tech
high-school
1
answer
2
votes
20.5k
views
50 POINTS 1. int f = 8; out.println("$"+f+10); what is the output and how did you get that? 2. int e = 12; e = 15; out.println(e); what is the output and how did you get that? 3. int i =7, j = 10; j *=i+2;
Hajikelist
asked
Dec 24, 2024
by
Hajikelist
8.4k
points
Computers & Tech
high-school
1
answer
0
votes
191k
views
Which language, developed for use in telescopes, is now used by courier services? A. TRAF B. MAVEN C. NEAT D. Forth
Malaguna
asked
Dec 24, 2024
by
Malaguna
8.2k
points
Computers & Tech
high-school
1
answer
1
vote
137k
views
Page:
« prev
1
...
53
54
55
56
57
58
59
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
What is .725 as a fraction
Compare and contrast an electric generator and a battery??
is it true or false that after the american revolution conflicts in the northwest territory erupted between remaining british soldiers and native americans
Search Qammunity.org