menu
Qammunity.org
Recent questions in Computers & Tech
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers & Tech
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Recent questions in Computers & Tech
What is important about Mule Domains when you want to use them?
Adi Shavit
asked
Oct 12, 2024
by
Adi Shavit
7.9k
points
Computers & Tech
high-school
1
answer
5
votes
117k
views
What will the following code output and why? var b = 1; function outer(){ var b = 2 function inner(){ b++; var b = 3; (b) } inner(); } outer();
Carter Pape
asked
Oct 12, 2024
by
Carter Pape
8.0k
points
Computers & Tech
high-school
1
answer
5
votes
107k
views
What is Squid? a. Key authentication system b. Proxy server c. Database software d. Web server software
Hetzroni
asked
Oct 12, 2024
by
Hetzroni
7.5k
points
Computers & Tech
high-school
1
answer
3
votes
79.4k
views
What are the requirements for vault custodians and using activity custodians (or their authorized representatives) when delivery lists are used to account for all issue of Code Q and Code R items? A) Verify
TobyRush
asked
Oct 12, 2024
by
TobyRush
7.8k
points
Computers & Tech
high-school
1
answer
4
votes
215k
views
Frank researched buying a specific brand and set of golf clubs that he wanted. He put the information he found in the table. Retailer Regular Price Coupons or Discounts Salex Tax After Discounts Shipping
Nicholas Albion
asked
Oct 12, 2024
by
Nicholas Albion
8.5k
points
Computers & Tech
high-school
1
answer
2
votes
195k
views
implement the method below, whose parameter, num, is an int pointer. the method must return an int whose value is three times that of the integer pointed to by num.
Benbrunton
asked
Oct 12, 2024
by
Benbrunton
7.9k
points
Computers & Tech
college
1
answer
4
votes
17.9k
views
OM's transformation role is to add value. Value added is what?
Kamran Omar
asked
Oct 12, 2024
by
Kamran Omar
7.9k
points
Computers & Tech
high-school
1
answer
3
votes
21.4k
views
Which two options are part of the SAFe Core Values? a) Respect for people and culture b) Program Backlog c) Inspect and adapt d) Hierarchical decision-making
MattAllegro
asked
Oct 12, 2024
by
MattAllegro
8.6k
points
Computers & Tech
high-school
1
answer
5
votes
118k
views
Evaluate the morality of Online Voting by weighing its benefits and risks. The discussion assumes that online voting would be implemented via a Web browser, though similar arguments could be made if another
Abhilash Panigrahi
asked
Oct 12, 2024
by
Abhilash Panigrahi
8.0k
points
Computers & Tech
high-school
1
answer
0
votes
192k
views
if you have an old drive that spins up but wont seek, it is probably a mechanical failure. that last ditch effort before giving up or sending it out for data recovery is tapping lightly with a screwdriver
Scott Forbes
asked
Oct 12, 2024
by
Scott Forbes
7.9k
points
Computers & Tech
high-school
1
answer
2
votes
80.1k
views
A concern with Internet sampling frames is that there is no comprehensive directory of or standard format for email addresses. True or False
Zzyzy
asked
Oct 12, 2024
by
Zzyzy
8.2k
points
Computers & Tech
high-school
1
answer
2
votes
109k
views
Create an AutoCorrect entry to change pedcure to pedicure when typed. a) Tools > AutoCorrect > Add Entry > pedcure > pedicure b) File > Options > AutoCorrect > pedcure > pedicure c) Insert > AutoCorrect
Xani
asked
Oct 12, 2024
by
Xani
8.7k
points
Computers & Tech
high-school
1
answer
4
votes
175k
views
Who reviews and approves all dives submitted in DJRS?
Kondor
asked
Oct 12, 2024
by
Kondor
8.3k
points
Computers & Tech
high-school
1
answer
1
vote
219k
views
communication trigger happens when a penetration tester discovers that the network or a system has already been compromised previously by another attacker. In this situation, the tester usually communicates
Kjaquier
asked
Oct 12, 2024
by
Kjaquier
8.3k
points
Computers & Tech
high-school
1
answer
1
vote
207k
views
Give me some(at least 4) online free link for making android app ui design.
Michael Revlis
asked
Oct 12, 2024
by
Michael Revlis
8.4k
points
Computers & Tech
high-school
1
answer
1
vote
182k
views
Hich of the following tasks can be performed using SIEM tools? Select three answers. a. Log management b. Virus scanning c. Intrusion detection d. Email marketing
Kerek
asked
Oct 12, 2024
by
Kerek
8.2k
points
Computers & Tech
high-school
1
answer
2
votes
9.4k
views
Who introduced the hard drive to the marketplace? Option 1: Steve Jobs Option 2: Al Shugart Option 3: Larry Ellison Option 4: Bill Gates
Bo Milanovich
asked
Oct 12, 2024
by
Bo Milanovich
7.9k
points
Computers & Tech
high-school
1
answer
0
votes
76.3k
views
How do you cascade multiple workbooks equally? Option 1: Use the "Arrange All" feature under the "View" tab to cascade multiple workbooks. Option 2: Manually resize and arrange each workbook's window side
Javier Toja
asked
Oct 12, 2024
by
Javier Toja
7.9k
points
Computers & Tech
high-school
1
answer
4
votes
214k
views
How to change time display on iphone lock screen
DTig
asked
Oct 12, 2024
by
DTig
8.4k
points
Computers & Tech
high-school
1
answer
2
votes
151k
views
Imagine that you are a medical researcher compiling data for a study. You have collected data about a set of patients, all of whom suffered from the same illness. During their course of treatment, each
Nkjt
asked
Oct 12, 2024
by
Nkjt
8.4k
points
Computers & Tech
high-school
1
answer
2
votes
213k
views
Page:
« prev
1
...
909
910
911
912
913
914
915
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
Compare and contrast an electric generator and a battery??
What goal of the constitution was also a goal of the Magna Carta?
Search Qammunity.org