menu
Qammunity.org
Recent questions in Computers & Tech
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers & Tech
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Recent questions in Computers & Tech
Of the following choices, what is the best form of anti-malware protection? A. Multiple solutions on each system B. A single solution throughout the organization C. Anti-malware protection at several locations
Neeku
asked
Oct 10, 2024
by
Neeku
8.4k
points
Computers & Tech
high-school
1
answer
2
votes
60.6k
views
Which are filter options in the Chrome Web Store?
Nyesha
asked
Oct 10, 2024
by
Nyesha
8.1k
points
Computers & Tech
high-school
1
answer
3
votes
20.7k
views
When Gina gets information from the Hyderabad, India, office, she is acting as a ___.
Nakajima
asked
Oct 10, 2024
by
Nakajima
8.8k
points
Computers & Tech
high-school
1
answer
3
votes
184k
views
An organization's network engineering team recently deployed a new software encryption solution to ensure the confidentiality of data at rest, which was found to add 300ms of latency to data read-write
Hasanyasin
asked
Oct 10, 2024
by
Hasanyasin
8.4k
points
Computers & Tech
high-school
1
answer
2
votes
224k
views
what is oversubscription ratio, what is an appropriate oversubscription ratio for a network, and how does this help you choose the number of leaf switches in a network?how do you determine how many spine
Basaundi
asked
Oct 10, 2024
by
Basaundi
8.1k
points
Computers & Tech
high-school
1
answer
1
vote
120k
views
One recent enhancement to client-server computing is ____, in which more than one server can run on the same physical piece of equipment.
MeetJoeBlack
asked
Oct 10, 2024
by
MeetJoeBlack
7.4k
points
Computers & Tech
high-school
1
answer
5
votes
166k
views
Write an ARMv8 assembly function (sum_srs) to compute the equation y=∑ n=1 a (a n +b). The inputs and to the function are passed using the register X1 and X2 respectively and the result is returned using
Kerith
asked
Oct 10, 2024
by
Kerith
8.0k
points
Computers & Tech
high-school
1
answer
1
vote
46.9k
views
Until 1995, ____ handled the bulk of the communications activity, or traffic, on the Internet.
Monksp
asked
Oct 10, 2024
by
Monksp
8.3k
points
Computers & Tech
high-school
1
answer
5
votes
171k
views
What is the process of determining whether a workflow has been correctly carried out?
Brent Friar
asked
Oct 10, 2024
by
Brent Friar
8.0k
points
Computers & Tech
high-school
1
answer
3
votes
52.3k
views
Create a new worksheet called Cover Page, and position it before the Mileage Log worksheet.
Dinash
asked
Oct 10, 2024
by
Dinash
8.4k
points
Computers & Tech
high-school
2
answers
4
votes
1.7k
views
Saima is using Bot Insight and wants to analyze the data in it. Which role should she use? 1) Administrator 2) Analyst 3) Developer 4) User
Rajeshkumar
asked
Oct 10, 2024
by
Rajeshkumar
8.8k
points
Computers & Tech
high-school
1
answer
1
vote
231k
views
Where did Valerie Thomas work as a mathematical data analyst?
Crefird
asked
Oct 10, 2024
by
Crefird
8.4k
points
Computers & Tech
high-school
1
answer
3
votes
30.9k
views
IWB do characters exchange Tumblr URLS?
Bob Roberts
asked
Oct 10, 2024
by
Bob Roberts
8.3k
points
Computers & Tech
high-school
1
answer
4
votes
190k
views
An Azure __________ is a defined area of the world that contains at least one Azure Region. A. geography B. datacenter C. region
Runner
asked
Oct 10, 2024
by
Runner
7.5k
points
Computers & Tech
high-school
1
answer
1
vote
139k
views
*Knowledge Management System Solutions (continued)* When working in a service desk:
NiceToMytyuk
asked
Oct 10, 2024
by
NiceToMytyuk
8.4k
points
Computers & Tech
high-school
1
answer
5
votes
10.0k
views
The most common EV technology-related question your customers will ask include
Onedozenbagels
asked
Oct 10, 2024
by
Onedozenbagels
8.1k
points
Computers & Tech
college
1
answer
2
votes
85.9k
views
4. What type of WLAN security is normally used to encrypt and provide data privacy for 802.11 traffic that traverses across mesh backhaul links? A: 802.1X/EAP B: SAE C: PSK D: IPsec E: VRRP
Rob Greenlee
asked
Oct 10, 2024
by
Rob Greenlee
7.8k
points
Computers & Tech
high-school
1
answer
4
votes
13.6k
views
Which of the following cloud concept is related to pooling and sharing of resources? (a) Polymorphism (b) Abstraction (c) Virtualization (d) None of the mentioned
Daniel Schepler
asked
Oct 10, 2024
by
Daniel Schepler
8.2k
points
Computers & Tech
high-school
1
answer
1
vote
179k
views
ALTER SETTINGS permission grants EXECUTE permission on sp_configure. A. True B. False
George Rosario
asked
Oct 10, 2024
by
George Rosario
7.9k
points
Computers & Tech
high-school
1
answer
1
vote
98.7k
views
Jacob also wants to examine the percentage each type of lighting product contributed to total sales in each store. Create a pivot chart as follows: a. Based on the PivotTable on the Stores worksheet, create
ROODAY
asked
Oct 10, 2024
by
ROODAY
7.3k
points
Computers & Tech
high-school
1
answer
5
votes
178k
views
Page:
« prev
1
...
935
936
937
938
939
940
941
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
What is .725 as a fraction
Compare and contrast an electric generator and a battery??
Search Qammunity.org