menu
Qammunity.org
Recent questions in Computers & Tech
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers & Tech
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Recent questions in Computers & Tech
Destruction refers to destroying classified information so that it can't be recognized or reconstructed. a) Deletion b) Disposal c) Archiving d) Encryption
Himani Agrawal
asked
Oct 13, 2024
by
Himani Agrawal
8.2k
points
Computers & Tech
high-school
1
answer
4
votes
101k
views
In a _________ configuration, the application processing is performed in an optimized fashion, taking advantage of the strengths of both client and server machines and of the distribution of data.
Reza Rahimi
asked
Oct 13, 2024
by
Reza Rahimi
8.4k
points
Computers & Tech
high-school
1
answer
5
votes
174k
views
I would like assistance with the following questions What form of cloud computing (private, public, etc.) do you recommend companies to have? Explain why and use related contexts and characteristics. 1)cloud
Tarkeshwar
asked
Oct 13, 2024
by
Tarkeshwar
8.8k
points
Computers & Tech
high-school
2
answers
0
votes
36.5k
views
Write down the html tag to get following output. Science 1. physics 2. chemistry 3. Biology Subject •Science •Math • Computer
Daniel Mora
asked
Oct 13, 2024
by
Daniel Mora
7.6k
points
Computers & Tech
high-school
1
answer
1
vote
1.3k
views
If the classification in the existing content seems incorrect, or there is conflicting guidance from authorized sources, what should you do? a) Proceed without changes b) Seek further guidance c) Consult
Shoeb Mirza
asked
Oct 13, 2024
by
Shoeb Mirza
7.9k
points
Computers & Tech
high-school
1
answer
2
votes
80.2k
views
What technology enables logisticians to identify, categorize, and locate assets?
Siby
asked
Oct 13, 2024
by
Siby
8.9k
points
Computers & Tech
high-school
1
answer
2
votes
77.1k
views
Veronica has just received an alert from a monitoring system that it has detected beaconing on the network. Which of the following should she do next? a. Determine which computer(s) may have malware infections.
Muds
asked
Oct 13, 2024
by
Muds
8.7k
points
Computers & Tech
high-school
1
answer
3
votes
125k
views
Translate the given conformer from the wedge-dash drawing into its newman projection?
Jane Wayne
asked
Oct 13, 2024
by
Jane Wayne
7.8k
points
Computers & Tech
high-school
1
answer
1
vote
194k
views
How long does a log file need to exist to be picked up by Log Monitoring? a) 1 minute b) 5 minutes c) 10 minutes d) 15 minutes
Qqilihq
asked
Oct 13, 2024
by
Qqilihq
8.0k
points
Computers & Tech
high-school
1
answer
2
votes
116k
views
A switch is configured to run STP. What term describes the switch port closest, in terms of overall cost, to the root bridge? A) Root port B) Designated port C) Alternate port D) Disabled
Lighter
asked
Oct 13, 2024
by
Lighter
8.1k
points
Computers & Tech
high-school
1
answer
5
votes
70.2k
views
To move data using the clipboard, select the data to be moved, click the ___________button , place the insertion point where the data is to be moved and click the _______button? A) Copy B) Cut C) Paste
Romesh
asked
Oct 13, 2024
by
Romesh
8.1k
points
Computers & Tech
high-school
1
answer
1
vote
183k
views
Which system captures, organizes, and capitalizes on interactions between a company and its customers?
Datoraki
asked
Oct 13, 2024
by
Datoraki
7.8k
points
Computers & Tech
high-school
1
answer
5
votes
140k
views
Please list and describe four no-passing situations in traffic or driving scenarios. Write your answer on a separate sheet of paper.
Marek Sebera
asked
Oct 13, 2024
by
Marek Sebera
7.9k
points
Computers & Tech
high-school
1
answer
2
votes
132k
views
What are the three basic encodings of structured data A) Flexibility in schema design B) Horizontal scalability C) Efficient handling of unstructured data D) Simplified data retrieval
Eswenson
asked
Oct 13, 2024
by
Eswenson
9.5k
points
Computers & Tech
high-school
1
answer
5
votes
53.0k
views
Write a program that asks the user to input an integer named numdoubles. a) Print("Enter an integer: ") b) numdoubles = input("Enter an integer: ") c) get_integer(numdoubles) d) int(numdoubles) = input("Enter
Malwinder Singh
asked
Oct 13, 2024
by
Malwinder Singh
8.6k
points
Computers & Tech
high-school
1
answer
4
votes
66.2k
views
Which of the following can be found on a router's routing table: A. Default Route B. Direct Route C. Remote Route D. All of the above E. None of the above What is the purpose of the destination port in
Fabian Braun
asked
Oct 13, 2024
by
Fabian Braun
7.2k
points
Computers & Tech
high-school
1
answer
4
votes
140k
views
User involvement is critical throughout the system development process TRUE FALSE.
Canzhiye
asked
Oct 13, 2024
by
Canzhiye
7.7k
points
Computers & Tech
high-school
1
answer
2
votes
69.0k
views
In a worksheet, the vertical spaces with headings A, B, C, and so on. A) Columns B) Rows C) Cells D) Ranges
Saftargholi
asked
Oct 13, 2024
by
Saftargholi
7.9k
points
Computers & Tech
high-school
1
answer
1
vote
89.2k
views
Select the correct answer from each drop down menu. The Silk Road connected diverse regions, such as West Asia, South Asia, and Central Asia.
Rahul Shewale
asked
Oct 13, 2024
by
Rahul Shewale
8.1k
points
Computers & Tech
high-school
1
answer
4
votes
149k
views
Create pay rate data for each employee with the hourly pay rate between 15 to 50 in excel
Carl Russmann
asked
Oct 13, 2024
by
Carl Russmann
7.6k
points
Computers & Tech
high-school
1
answer
1
vote
65.4k
views
Page:
« prev
1
...
901
902
903
904
905
906
907
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
Compare and contrast an electric generator and a battery??
Who made dutch claims in north america?
Search Qammunity.org