menu
Qammunity.org
Recent questions in Computers & Tech
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers & Tech
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Recent questions in Computers & Tech
Discuss various types of cloud computing services and type of wireless encryption
SRKX
asked
Dec 22, 2024
by
SRKX
7.5k
points
Computers & Tech
college
1
answer
0
votes
4.2k
views
To build network fault tolerance with DFS Namespace and DFS Replication:
Artem P
asked
Dec 22, 2024
by
Artem P
8.2k
points
Computers & Tech
high-school
1
answer
4
votes
231k
views
Kelli has a work project that utilizes many files. What is the most effective way for her to organize her project files?
Joe Flynn
asked
Dec 22, 2024
by
Joe Flynn
7.5k
points
Computers & Tech
college
1
answer
5
votes
11.3k
views
a ____ is an interconnection of computers and computing equipment using either wires or radio waves and can share data and computing resources.
Nidhi
asked
Dec 22, 2024
by
Nidhi
7.8k
points
Computers & Tech
high-school
1
answer
2
votes
126k
views
Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information? A) domain-based B) peer-to-peer
Md Shahriar
asked
Dec 22, 2024
by
Md Shahriar
8.2k
points
Computers & Tech
high-school
1
answer
0
votes
7.1k
views
What does the "T" in 10Base-T and 100Base-T stand for?
UnDeadHerbs
asked
Dec 22, 2024
by
UnDeadHerbs
7.6k
points
Computers & Tech
high-school
1
answer
4
votes
231k
views
What is the value of the message variable after the following code executes? var message = ""; for (var i = 0; i < 5; i++ ) { message += "L:" + i + ",";} options: A) L:5, B) L:0,L:1,L:2,L:3,L:4, C) L:0,L:1,L:2,L:3,L:4,L:5, D) L:1,L:2,L:3,L:4,L:5,
Sites
asked
Dec 22, 2024
by
Sites
8.3k
points
Computers & Tech
high-school
1
answer
2
votes
96.4k
views
The digital signature standard established by nist is used for electronic document authentication by federal information systems. it is based on a variant of the elgamal algorithm. group of answer choices
MrEs
asked
Dec 22, 2024
by
MrEs
7.8k
points
Computers & Tech
high-school
1
answer
2
votes
204k
views
Write a C++ program where a human will play the computer in a game of Mankala. We will make the smart computer once we get this first part working. Use simple characters to illustrate the board and letters
DCuser
asked
Dec 22, 2024
by
DCuser
7.7k
points
Computers & Tech
high-school
1
answer
4
votes
128k
views
What questions can be answered with technical product education through the authentic connection method of building outfits?
Trix
asked
Dec 22, 2024
by
Trix
8.0k
points
Computers & Tech
high-school
1
answer
2
votes
71.4k
views
50 POINTS I'm trying to write a code. flip = 1 is a boolean and b1 is a button. I'm trying to say if (flip==1&&b1) { out.print("You Win"); } But I get an error saying "bad operand types for binary operator
Zakiya
asked
Dec 22, 2024
by
Zakiya
7.5k
points
Computers & Tech
high-school
1
answer
4
votes
185k
views
A program is designed for Hollywood movie ratings to be installed in art council theaters. What statement about the program execution process is correct? A. The program stops when the user inputs a negative
Etienne Martin
asked
Dec 22, 2024
by
Etienne Martin
8.1k
points
Computers & Tech
high-school
1
answer
1
vote
63.1k
views
COMPUTERS CONNECT TO EACH OTHER THROUGH A CENTRAL DEVICE CALLED A HUB OR SWITCH. ______ NETWORK CAN BE EXPANDED ANYTIME WITHOUT AFFECTING THE OPERATION OF THE NETWORK. THE CENTRAL DEVICE BECOMES THE SINGLE
Nche
asked
Dec 22, 2024
by
Nche
8.5k
points
Computers & Tech
high-school
1
answer
4
votes
11.0k
views
Describe the how privacy is covered in the HIPAA Privacy Rule, and how you would implement these measures in your private medical practice.
Hasezoey
asked
Dec 22, 2024
by
Hasezoey
8.2k
points
Computers & Tech
college
1
answer
4
votes
60.8k
views
Which NEC article covers branch circuits?
Bamba
asked
Dec 22, 2024
by
Bamba
7.9k
points
Computers & Tech
high-school
2
answers
5
votes
120k
views
consider this class: class family{ string firstname; int age; string family name; } // which variable supposed to be static?
Bnaecker
asked
Dec 22, 2024
by
Bnaecker
9.1k
points
Computers & Tech
high-school
1
answer
2
votes
171k
views
What kind of memory resides on a PDA? a) ROM b) RAM c) Flash ROM d) None of the above
Ztyx
asked
Dec 22, 2024
by
Ztyx
8.8k
points
Computers & Tech
high-school
1
answer
5
votes
175k
views
We forecast that the completion of supercomputers' development will be followed by a shortage of people who know how to make use of all this computing power. Proposed Assumption:It's only a matter of time
Rickard Nilsson
asked
Dec 22, 2024
by
Rickard Nilsson
8.5k
points
Computers & Tech
high-school
1
answer
5
votes
43.9k
views
Which file in Linux tells the system which DNS server to use? A) /etc/network/interfaces B) /etc/hosts C) /etc/resolv.conf D) /etc/dnsconfig
Alex Berdyshev
asked
Dec 22, 2024
by
Alex Berdyshev
8.0k
points
Computers & Tech
high-school
1
answer
0
votes
12.3k
views
Explain the virutal DOM and what frameworks use this for.
Nard
asked
Dec 22, 2024
by
Nard
7.5k
points
Computers & Tech
high-school
1
answer
1
vote
25.0k
views
Page:
« prev
1
...
75
76
77
78
79
80
81
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
What goal of the constitution was also a goal of the Magna Carta?
is it true or false that after the american revolution conflicts in the northwest territory erupted between remaining british soldiers and native americans
Search Qammunity.org