menu
Qammunity.org
Recent questions in Computers & Tech
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers & Tech
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Recent questions in Computers & Tech
Traceability is defined as the ability to trace the history, application, or location of that under consideration
Aaron Liu
asked
Dec 24, 2024
by
Aaron Liu
7.6k
points
Computers & Tech
high-school
1
answer
4
votes
171k
views
A network uses a star topology. How are the devices connected? A. Each device is connected to two other devices. B. Each device is connected to a bus. C. Each device is connected to all the others. D.
Claude
asked
Dec 24, 2024
by
Claude
8.7k
points
Computers & Tech
college
1
answer
0
votes
6.9k
views
What kind of keyboard does the Blackberry have? a) QWERTY b) CUTEY c) LCD d) None of the above
Gilbert Kakaz
asked
Dec 24, 2024
by
Gilbert Kakaz
8.5k
points
Computers & Tech
high-school
1
answer
2
votes
158k
views
Which specific unit is designed for conducting workovers that are killed?
Michael Geary
asked
Dec 24, 2024
by
Michael Geary
8.2k
points
Computers & Tech
high-school
1
answer
0
votes
133k
views
How to make a repo private in github
Alex Reid
asked
Dec 24, 2024
by
Alex Reid
8.9k
points
Computers & Tech
high-school
1
answer
0
votes
88.6k
views
Which of the following keywords can be used to close the macro syntax? a) CLOSE b) END c) EXIT d) FINISH
Sapar Friday
asked
Dec 24, 2024
by
Sapar Friday
8.5k
points
Computers & Tech
high-school
1
answer
5
votes
88.4k
views
Roughly how large are modern websites?
Digvesh Patel
asked
Dec 24, 2024
by
Digvesh Patel
7.6k
points
Computers & Tech
high-school
1
answer
3
votes
99.6k
views
True or False: Verifications can be run on associated entities
Sunbabaphu
asked
Dec 24, 2024
by
Sunbabaphu
7.3k
points
Computers & Tech
high-school
1
answer
5
votes
84.3k
views
True or false? If a lead flow only asks for a visitor's email address, that's enough information to create a useful record in the CRM.
Nayan Dabhi
asked
Dec 24, 2024
by
Nayan Dabhi
7.9k
points
Computers & Tech
high-school
1
answer
5
votes
116k
views
When we use rules to form and manipulate symbols in order to communicate, we are using: a. Language b. Phonetics c. Semantics d. Pragmatics
Nurseyit Tursunkulov
asked
Dec 24, 2024
by
Nurseyit Tursunkulov
9.2k
points
Computers & Tech
high-school
1
answer
0
votes
134k
views
Select the variable identifier that is not valid in c . a. five rings b. 5rings c. five rings d. fiverings
Alexus
asked
Dec 24, 2024
by
Alexus
7.3k
points
Computers & Tech
high-school
1
answer
3
votes
188k
views
Are "visual effects artist" and "special effects artist" essentially different names for the same job? 1) True 2) False
Haventchecked
asked
Dec 24, 2024
by
Haventchecked
7.7k
points
Computers & Tech
high-school
1
answer
3
votes
70.8k
views
A __________ refers to the systematic organization of artifacts into types on the basis of shared __________. A) taxonomy; characteristics B) hierarchy; functions C) classification; properties D) grouping;
Nungster
asked
Dec 24, 2024
by
Nungster
7.8k
points
Computers & Tech
high-school
1
answer
1
vote
162k
views
What good project management practices did the project manager and the team use?
Dholstius
asked
Dec 24, 2024
by
Dholstius
9.4k
points
Computers & Tech
high-school
1
answer
5
votes
102k
views
What is Software Engineering: A.) A collection of techniques, methodologies and tools that help with the production of a high quality software system. B.) Writing Code C.) Building a program D.) Understanding
Conandor
asked
Dec 24, 2024
by
Conandor
8.4k
points
Computers & Tech
high-school
1
answer
2
votes
91.4k
views
What are the 2 types of k-anonymity attacks?
Edmond Burnett
asked
Dec 24, 2024
by
Edmond Burnett
8.2k
points
Computers & Tech
high-school
1
answer
1
vote
58.6k
views
The four steps of the learning loop are: Tell, Show, Do, and Review. True or False?
Bodee
asked
Dec 24, 2024
by
Bodee
7.5k
points
Computers & Tech
high-school
1
answer
4
votes
196k
views
Using Python, solve this problem.
Robin Rieger
asked
Dec 24, 2024
by
Robin Rieger
7.9k
points
Computers & Tech
high-school
1
answer
3
votes
107k
views
Suppose we want to implement the instruction lwr $ra, $rb($rc) which works like a regular lw instruction but uses a register value ($rb) instead of an immediate value to calculate a memory address. (a)
Osundblad
asked
Dec 24, 2024
by
Osundblad
8.2k
points
Computers & Tech
high-school
1
answer
3
votes
177k
views
We often receive emails that advertise products. These mails can prove to be security threats to users .Which computer security threat involves sending such potentially infected, unsolicited emails?
Venkatesh
asked
Dec 24, 2024
by
Venkatesh
8.4k
points
Computers & Tech
high-school
1
answer
5
votes
188k
views
Page:
« prev
1
...
56
57
58
59
60
61
62
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
What is .725 as a fraction
Compare and contrast an electric generator and a battery??
Search Qammunity.org