menu
Qammunity.org
Recent questions in Computers & Tech
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers & Tech
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Recent questions in Computers & Tech
Which letter is at position (2, -7)? A. O B. Z C. W D. V
Miguel Isla
asked
Dec 23, 2024
by
Miguel Isla
8.5k
points
Computers & Tech
high-school
1
answer
3
votes
63.6k
views
Write a C++ program to calculate profit or loss using a switch statement.
ThePuzzleMaster
asked
Dec 23, 2024
by
ThePuzzleMaster
8.2k
points
Computers & Tech
high-school
1
answer
5
votes
188k
views
What is an example of a NoSQL datastore of the "Document Store" type? A. MongoDB B. REDIS C. Cassandra D. HBase
Wickethewok
asked
Dec 23, 2024
by
Wickethewok
8.0k
points
Computers & Tech
high-school
1
answer
4
votes
127k
views
The first cameras were... a. invisible b. electric c. room-sized d. free e. gas-powered
Daniil Harik
asked
Dec 23, 2024
by
Daniil Harik
8.0k
points
Computers & Tech
high-school
1
answer
2
votes
218k
views
A collection of entity/event instances is a? 1) record 2) table 3) field 4) character
Alex Shestakov
asked
Dec 23, 2024
by
Alex Shestakov
7.6k
points
Computers & Tech
high-school
1
answer
5
votes
34.7k
views
Arithmetic Instructions Using only registers (no input) add 1 + 2 and display the result. You can move the result to a variable then print it.
Candyce
asked
Dec 23, 2024
by
Candyce
8.2k
points
Computers & Tech
college
1
answer
3
votes
148k
views
How can you allow customers outside of your VPC to use Kibana with Elasticsearch? A) Share your VPC credentials with customers. B) Use an Amazon Elasticsearch proxy server. C) Set up an Amazon Cognito
Mateusz Chrzaszcz
asked
Dec 23, 2024
by
Mateusz Chrzaszcz
8.0k
points
Computers & Tech
high-school
1
answer
4
votes
31.5k
views
What are the steps to verify intrusion detection system alerts and perform more repetitive steps to mitigate well-known attacks?
Alex Polkhovsky
asked
Dec 23, 2024
by
Alex Polkhovsky
8.3k
points
Computers & Tech
high-school
1
answer
3
votes
108k
views
How to unlock function key on dell laptop
Peoray
asked
Dec 23, 2024
by
Peoray
7.7k
points
Computers & Tech
high-school
1
answer
0
votes
186k
views
Your network contains an Active Directory domain named . All domain controllers run Windows Server 2012. The domain contains two servers. The servers are configured as shown in the following table. Server1
Jlhuertas
asked
Dec 23, 2024
by
Jlhuertas
7.9k
points
Computers & Tech
high-school
1
answer
5
votes
139k
views
During which Now Create stage are workshops conducted?
Jqwha
asked
Dec 23, 2024
by
Jqwha
7.6k
points
Computers & Tech
high-school
1
answer
4
votes
223k
views
Where is the television located?
GregGalloway
asked
Dec 23, 2024
by
GregGalloway
8.0k
points
Computers & Tech
high-school
1
answer
1
vote
76.0k
views
Which information system will track information provided to a requester? a. Registry b. Quality improvement c. Chart tracking d. Release of information
MHP
asked
Dec 23, 2024
by
MHP
8.3k
points
Computers & Tech
high-school
1
answer
3
votes
110k
views
Consider a continuous-time signal x(t) given by: x(t)=e⁻ᵗfind the Fourier transform of the signal x(t).
Konrad Gadzina
asked
Dec 23, 2024
by
Konrad Gadzina
8.4k
points
Computers & Tech
high-school
1
answer
5
votes
1.0k
views
Which of the following should be considered when implementing a low power IoT device (or, which attributes will impact power usage on an IoT device)? 1) Clock rate of the CPU 2) Sensor resolution 3) Number
Jayanga
asked
Dec 23, 2024
by
Jayanga
8.6k
points
Computers & Tech
high-school
1
answer
3
votes
4.5k
views
CURRENT_TIME / NOW(), CURRENT_DATE, CURRENT_TIMESTAMP Option 1: GET_TIME Option 2: CURRENT_TIME Option 3: NOW() Option 4: CURRENT_TIMESTAMP
Edenhill
asked
Dec 23, 2024
by
Edenhill
8.5k
points
Computers & Tech
high-school
1
answer
1
vote
163k
views
What is Ran-GTP always used to export?
Chris Glasier
asked
Dec 23, 2024
by
Chris Glasier
8.0k
points
Computers & Tech
high-school
1
answer
3
votes
36.9k
views
A(n) ________ sits outside an organizational network and is the first device that Internet traffic encounters. A) internal firewall B) perimeter firewall C) adware D) malware
MUHAMMAD ILYAS
asked
Dec 23, 2024
by
MUHAMMAD ILYAS
7.7k
points
Computers & Tech
high-school
1
answer
3
votes
24.4k
views
What does the pilcrow indicate in InDesign?
Icguy
asked
Dec 23, 2024
by
Icguy
7.7k
points
Computers & Tech
high-school
1
answer
4
votes
43.4k
views
On the Table worksheet, assign the name, Budget, to thetable on the worksheet.
Votemike
asked
Dec 23, 2024
by
Votemike
8.0k
points
Computers & Tech
high-school
1
answer
2
votes
63.4k
views
Page:
« prev
1
...
66
67
68
69
70
71
72
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
What is .725 as a fraction
Compare and contrast an electric generator and a battery??
Search Qammunity.org