menu
Qammunity.org
Recent questions in Computers & Tech
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers & Tech
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Recent questions in Computers & Tech
Which safeguards should you employ to protect cell phones owned by an organization? (Choose THREE): A Enable wireless interfaces. B Maintain physical control. C Enable user authentication. D Disable unneeded
Shontae
asked
Oct 9, 2024
by
Shontae
8.9k
points
Computers & Tech
high-school
1
answer
0
votes
28.2k
views
What is the maximum transmission speed for Bluetooth devices? a. 1 Mbps b. 3 Mbps c. 54 Mbps d. 11 Mbps
Augustina
asked
Oct 9, 2024
by
Augustina
8.1k
points
Computers & Tech
high-school
1
answer
2
votes
214k
views
The team will refine their code so they can simulate how changing parameters of the system, such as mass, temperature, and distance, will affect the emitted light. What is true about this statement?
Sagar Pise
asked
Oct 9, 2024
by
Sagar Pise
7.9k
points
Computers & Tech
high-school
1
answer
4
votes
73.5k
views
Match each step of the learning process with the correct part of the scenario. 1) Elle studies her notes at home. 2) Elle's teacher explains the process of photosynthesis. 3) Elle correctly labels the
JacobW
asked
Oct 9, 2024
by
JacobW
8.6k
points
Computers & Tech
high-school
1
answer
5
votes
44.4k
views
What types of information does the id command provide? (Select all that apply.) A. Your UID number B. Your terminal identifier C. Your current group D. All your group memberships E. Your username
Marco Blos
asked
Oct 9, 2024
by
Marco Blos
8.0k
points
Computers & Tech
high-school
1
answer
0
votes
13.3k
views
*Using and Creating Knowledge Bases (continued)* In KCS
Irshad Qureshi
asked
Oct 9, 2024
by
Irshad Qureshi
8.6k
points
Computers & Tech
high-school
1
answer
5
votes
57.0k
views
______ uses short-range radio signals to enable computers and devices to communicate with each other, such as a phone to a headset.
Hendraspt
asked
Oct 9, 2024
by
Hendraspt
8.4k
points
Computers & Tech
high-school
1
answer
0
votes
154k
views
When a value is pushed onto the stack, what happens to the address stored in the stack pointer?
Tomcam
asked
Oct 9, 2024
by
Tomcam
8.9k
points
Computers & Tech
high-school
1
answer
4
votes
95.5k
views
How to Mitigate the Risk of Attacks: Preventive Controls - Communication (Network) Controls
Jennelle
asked
Oct 9, 2024
by
Jennelle
8.5k
points
Computers & Tech
high-school
1
answer
0
votes
28.6k
views
After running a search, what effect does clicking and dragging across the timeline have?
Ran
asked
Oct 9, 2024
by
Ran
8.2k
points
Computers & Tech
high-school
1
answer
0
votes
106k
views
Write a program to find final velocity (v²=u²+2as) qbasic
Nominal Animal
asked
Oct 9, 2024
by
Nominal Animal
7.7k
points
Computers & Tech
high-school
1
answer
2
votes
159k
views
Click this button in the Grouping & Totals group in the Report Layout Tools Design tab to perform functions such as finding the sum, average, maximum, or minimum of the numbers in a column. a) Math Function
Mhyousefi
asked
Oct 9, 2024
by
Mhyousefi
8.6k
points
Computers & Tech
high-school
1
answer
3
votes
172k
views
Which of the following are true of REST API and Splunk? 1) Provides direct and timely access to data 2) Supports basic and API-based authentication 3) Reduces overhead of maintaining machines and network
Shankar Agarwal
asked
Oct 9, 2024
by
Shankar Agarwal
8.7k
points
Computers & Tech
high-school
1
answer
1
vote
187k
views
Database ____ is a career in which a person manages, secures, upgrades, and back up databases.
Alexander Granin
asked
Oct 9, 2024
by
Alexander Granin
7.7k
points
Computers & Tech
high-school
1
answer
2
votes
151k
views
Which one of the following data elements would not normally be included in an evidence log? A. Serial number B. Record of handling C. Storage location D. Malware signatuers
Shollyman
asked
Oct 9, 2024
by
Shollyman
8.3k
points
Computers & Tech
high-school
1
answer
5
votes
27.9k
views
You are the Microsoft 365 administrator for a company. You deploy Windows 10 to all devices by using Windows Autopilot. You need to ensure that employees can install Microsoft Office 365 ProPlus on their
Eneida
asked
Oct 9, 2024
by
Eneida
8.3k
points
Computers & Tech
high-school
1
answer
4
votes
188k
views
What i the main advantage of uing high level language than internel machine code
Abhishek Kedia
asked
Oct 9, 2024
by
Abhishek Kedia
7.7k
points
Computers & Tech
high-school
1
answer
0
votes
90.1k
views
Which of the following is an object such as a field which can be inserted into a document
Josef Engelfrost
asked
Oct 9, 2024
by
Josef Engelfrost
8.8k
points
Computers & Tech
high-school
1
answer
4
votes
116k
views
A cybersecurity firm is building a team of hackers: A. Discuss the ethical considerations in hiring hackers for cybersecurity. B. Analyze the skills and expertise required for a cybersecurity team. C.
Favio
asked
Oct 9, 2024
by
Favio
8.0k
points
Computers & Tech
high-school
1
answer
1
vote
222k
views
The blender is used to prepare custard sundaes. a. TRUE b. FALSE
Fakeleft
asked
Oct 9, 2024
by
Fakeleft
7.8k
points
Computers & Tech
high-school
1
answer
3
votes
148k
views
Page:
« prev
1
...
949
950
951
952
953
954
955
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
What is .725 as a fraction
Compare and contrast an electric generator and a battery??
What goal of the constitution was also a goal of the Magna Carta?
Search Qammunity.org