menu
Qammunity.org
Recent questions in Computers & Tech
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers & Tech
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Recent questions in Computers & Tech
1) Given X byte 1,2,3,4,5 Y word 2,4, 1,100.1, 17,22 Zdword 1000, 1, 4,22, OAh What is x[3]? What is y[6]? What is z [4? Write the commands and loop to printout array z Use ex and esi
Sergio Tulentsev
asked
Dec 23, 2024
by
Sergio Tulentsev
7.8k
points
Computers & Tech
high-school
1
answer
3
votes
182k
views
Which of the following types of color products deposit color, or lift (lighten) and deposit color in a single-process technique? A) Demi-permanent colors B) Permanent colors C) Semi-permanent colors D)
Mac Adada
asked
Dec 23, 2024
by
Mac Adada
8.0k
points
Computers & Tech
high-school
1
answer
5
votes
183k
views
Sam has 3,250 followers on social media, and his number of followers is decreasing at a rate of 3% per week. Which function represents his number of followers after w weeks? A) f(w) = 3,250(0.97)^w B)
Jasdeep Khalsa
asked
Dec 23, 2024
by
Jasdeep Khalsa
8.2k
points
Computers & Tech
high-school
1
answer
0
votes
37.0k
views
I'm guessing AI could maybe be used to determine the simplest solution, and I think it can clearly be used to check when a proof works. But can AI make aesthetic judgments? If so, then it may well end
PafflesWancakes
asked
Dec 23, 2024
by
PafflesWancakes
8.0k
points
Computers & Tech
high-school
1
answer
5
votes
99.5k
views
Because SQL stored procedures allow and encourage code sharing among developers, stored procedures give database application developers the advantages of ________. 1) less work 2) standardized processing
Subbaraoc
asked
Dec 23, 2024
by
Subbaraoc
8.7k
points
Computers & Tech
high-school
1
answer
2
votes
8.7k
views
Create a Scanner in Java that reads a file indicating the quantity and type of coins, then writes to another file the total monetary value. Test it with the given examples.
Goweon
asked
Dec 23, 2024
by
Goweon
8.0k
points
Computers & Tech
high-school
1
answer
0
votes
219k
views
According to the lecture, which confidentiality measure is typically in place in EHR systems but often not activated or monitored? a. Audit-trail mechanisms b. Biometric authentication procedures c. Two-stage
Nick Krasnov
asked
Dec 23, 2024
by
Nick Krasnov
9.0k
points
Computers & Tech
high-school
1
answer
1
vote
67.3k
views
Network security revolves around the setup and use of __________ to control who and how objects are utilized. a. identification b. authentication, authorization, and permissions c. authentication and permissions
Dave Pateral
asked
Dec 23, 2024
by
Dave Pateral
7.9k
points
Computers & Tech
high-school
1
answer
4
votes
1.8k
views
Write a SQL statement to list all student records with gpa>= 10
Noisygecko
asked
Dec 23, 2024
by
Noisygecko
8.0k
points
Computers & Tech
high-school
1
answer
5
votes
147k
views
A program to find the greatest common factor of two numbers will use: a) Object-oriented programming. b) Binary numbers. c) A database. d) The modulus operator.
Jobou
asked
Dec 23, 2024
by
Jobou
7.8k
points
Computers & Tech
high-school
1
answer
4
votes
12.1k
views
Sarah is using a C43 component in her circuitry. Which option identifies this component? a) Capacitor b) Resistor c) Inductor d) Transistor
Not A JD
asked
Dec 23, 2024
by
Not A JD
7.7k
points
Computers & Tech
high-school
1
answer
3
votes
120k
views
A router will receive a packet, look at the _________ _______ ____________ located in the header of the packet, compare it to the routing table, and make a forwarding decision based off that.
Jeri
asked
Dec 23, 2024
by
Jeri
9.0k
points
Computers & Tech
high-school
1
answer
1
vote
61.5k
views
Which of the following security threats can be mitigated with "Physical Access Control"? - Pharming - Tailgating - Burglary - Social engineering - Brute-force attack
Kicken
asked
Dec 23, 2024
by
Kicken
8.5k
points
Computers & Tech
high-school
1
answer
0
votes
75.4k
views
When you purchase proprietary software, what does a software license allow you to do?
Pragnesh Rupapara
asked
Dec 23, 2024
by
Pragnesh Rupapara
8.5k
points
Computers & Tech
high-school
1
answer
4
votes
186k
views
7. Speculating Why do governments fund and promote literacy programs? 8. Analyzing Visuals Etamine the to images on page 664. How do these activities differ from lesure activities of the past?
Anthony Pegram
asked
Dec 23, 2024
by
Anthony Pegram
8.2k
points
Computers & Tech
high-school
1
answer
3
votes
133k
views
What are some things to consider when designing a file layout?
Dythim
asked
Dec 23, 2024
by
Dythim
7.5k
points
Computers & Tech
high-school
1
answer
3
votes
129k
views
How often is the e-learning module completed? How often is the self-assessment completed?
Paul Brinkley
asked
Dec 23, 2024
by
Paul Brinkley
8.4k
points
Computers & Tech
high-school
1
answer
4
votes
141k
views
What process involves placing one pdu inside of another pdu?
Bob Swart
asked
Dec 23, 2024
by
Bob Swart
8.0k
points
Computers & Tech
high-school
1
answer
5
votes
30.4k
views
You can use the scroll bars to move the pointer to a specific cell. a) True b) False
Stephen Dillon
asked
Dec 23, 2024
by
Stephen Dillon
7.8k
points
Computers & Tech
high-school
1
answer
1
vote
220k
views
The ____________ represents the fourth layer of defense for a typical it infrastructure.
Jontem
asked
Dec 23, 2024
by
Jontem
8.2k
points
Computers & Tech
high-school
1
answer
3
votes
67.4k
views
Page:
« prev
1
...
70
71
72
73
74
75
76
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
What is .725 as a fraction
Compare and contrast an electric generator and a battery??
Search Qammunity.org