menu
Qammunity.org
Recent questions in Computers & Tech
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers & Tech
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Recent questions in Computers & Tech
To modify the font of the company name on the 365 login page, what template should you modify? a) Office 365 Login Page Font Template b) Azure AD Company Branding Template c) SharePoint Online Typography
Zsofia
asked
Oct 12, 2024
by
Zsofia
7.2k
points
Computers & Tech
high-school
1
answer
0
votes
199k
views
A loyal fan that attends games regularly was dissatisfied with his experience at the last game he attended. Usually this fan will defect/drop out from attending future games. A. True B. False
Ffttyy
asked
Oct 12, 2024
by
Ffttyy
8.2k
points
Computers & Tech
high-school
1
answer
2
votes
126k
views
What needs to be done to integrate CSM with Service management?
Pjd
asked
Oct 12, 2024
by
Pjd
8.0k
points
Computers & Tech
high-school
1
answer
1
vote
220k
views
In python, Write a while loop that validates user input. The user should be prompted to enter a positive integer in the range 0 to 100. The while loop should print an error if an invalid value is entered
Pusparaj
asked
Oct 12, 2024
by
Pusparaj
8.5k
points
Computers & Tech
high-school
1
answer
3
votes
81.7k
views
Users who approve changes require ServiceNow license unless they do the approval through email. A. True B. False
Benallansmith
asked
Oct 12, 2024
by
Benallansmith
8.0k
points
Computers & Tech
high-school
1
answer
5
votes
8.3k
views
Recall that we use both a public key system and a hash function when computing digital signatures. Given M and S = [h(M)](Alice) (1) Precisely how is a digital signature computed and verified?
Alexandre Moraes
asked
Oct 12, 2024
by
Alexandre Moraes
8.7k
points
Computers & Tech
high-school
1
answer
2
votes
150k
views
You plan to deploy Unified Service Desk (USD). You need to install all USD components and verify the installation. Which three actions should you perform? Each correct answer presents part of the solution
Dieter Gribnitz
asked
Oct 12, 2024
by
Dieter Gribnitz
9.0k
points
Computers & Tech
high-school
1
answer
5
votes
118k
views
Which one of the following is an example of a platform-as-a-service (PaaS) computing environment? 1) Software-as-a-Service (SaaS) 2) Infrastructure-as-a-Service (IaaS) 3) Platform-as-a-Service (PaaS) 4)
Irina Rapoport
asked
Oct 12, 2024
by
Irina Rapoport
9.0k
points
Computers & Tech
high-school
1
answer
5
votes
191k
views
How do you open a locker at the Battle School in enders game A. You spin around 3 times while whispering, "Open Sesame". B. You put your hand on the sensor and say your name. C. You use a key to unlock
Junji Zhi
asked
Oct 12, 2024
by
Junji Zhi
8.4k
points
Computers & Tech
high-school
1
answer
5
votes
228k
views
Only ESXi6 host can be enabled for VM component protection, which allows vSphere HA to detect datastore accessibility failures and provides automated recovery for affected virtual machines. A) True. B)
Shayy
asked
Oct 12, 2024
by
Shayy
8.4k
points
Computers & Tech
high-school
1
answer
1
vote
221k
views
Autoboxing is . a. Automatic conversion of wrapper class objects to the corresponding primitive b. Use of a static method to convert a double to an automatic conversion of primitive types to the corresponding
Mr Grok
asked
Oct 12, 2024
by
Mr Grok
8.0k
points
Computers & Tech
high-school
1
answer
1
vote
134k
views
Telestaff password shall consist of a minimum of... A) 4 characters B) 6 characters C) 8 characters D) 10 characters
Abhishek Choudhary
asked
Oct 12, 2024
by
Abhishek Choudhary
7.9k
points
Computers & Tech
high-school
1
answer
3
votes
59.5k
views
What type of device isolates a network by filtering the packets that can enter it? a) firewall b) bridge c) gateway d) switch
Samshers
asked
Oct 12, 2024
by
Samshers
7.0k
points
Computers & Tech
high-school
1
answer
3
votes
72.8k
views
What is the beacon forwarder URL for Managed?
Muhteva
asked
Oct 12, 2024
by
Muhteva
7.7k
points
Computers & Tech
high-school
1
answer
3
votes
185k
views
You have a workstation running Windows 10, 64-bit edition. A local printer connected to a USB port is shared so that other users can print to that printer. Users running 32-bit versions of Windows report
Sebrock
asked
Oct 12, 2024
by
Sebrock
8.1k
points
Computers & Tech
high-school
1
answer
2
votes
92.6k
views
"q.27.1. Convert the following regular Expression to the equivalent Finite Automata. 1. bab* 2. (a|b) (abc|a+b+c)"
Aggietech
asked
Oct 12, 2024
by
Aggietech
8.8k
points
Computers & Tech
high-school
1
answer
4
votes
11.5k
views
laney just bought a new smartphone. she's already downloaded her contacts information and other data from the cloud. now she's copying her photos from her old phone onto the new device. once her new phone
Lonnell
asked
Oct 12, 2024
by
Lonnell
8.6k
points
Computers & Tech
high-school
1
answer
4
votes
227k
views
What can be controlled in Adjustment Approval Profile
Joe Sak
asked
Oct 12, 2024
by
Joe Sak
8.3k
points
Computers & Tech
high-school
1
answer
3
votes
105k
views
How many times can a transfer of a scheduled drug occur between two pharmacies without them sharing a database? a) Once b) Twice c) Thrice d) Unlimited
Kaderud
asked
Oct 12, 2024
by
Kaderud
8.7k
points
Computers & Tech
high-school
1
answer
5
votes
71.8k
views
How to put an image below another image in css?
Lord Midi
asked
Oct 12, 2024
by
Lord Midi
7.8k
points
Computers & Tech
high-school
1
answer
5
votes
206k
views
Page:
« prev
1
...
915
916
917
918
919
920
921
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
What is .725 as a fraction
Compare and contrast an electric generator and a battery??
Search Qammunity.org