menu
QAmmunity.org
Recent questions in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions in Computers and Technology
Team Member should never empty coffee server into hand sink, as this is a food code violation. A) True B) False
Bismillah
asked
Oct 8, 2024
by
Bismillah
8.3k
points
Computers and Technology
high-school
1
answer
0
votes
145k
views
Match the appropriate description to each of the eight steps listed below to designate the sequence of steps used for writing a technical document. All eight matches μst be correct to receive credit for
Katura
asked
Oct 8, 2024
by
Katura
7.9k
points
Computers and Technology
high-school
1
answer
4
votes
13.5k
views
What Azure tools can be used on Ubuntu machines? A) Azure Logic Apps and Azure DevOps B) Azure Resource Manager and Azure Functions C) Azure CLI and Azure PowerShell D) Azure Key Vault and Azure Active
OrwellHindenberg
asked
Oct 8, 2024
by
OrwellHindenberg
8.7k
points
Computers and Technology
high-school
1
answer
3
votes
106k
views
How to autofill passwords on chrome
Jacob
asked
Oct 8, 2024
by
Jacob
8.5k
points
Computers and Technology
high-school
1
answer
2
votes
63.4k
views
List ten Meta Programs, the question to elicit them, and how you use them in at least two contexts (either business, education, or therapy) for each Meta Program.
Lucienne
asked
Oct 8, 2024
by
Lucienne
8.2k
points
Computers and Technology
high-school
1
answer
4
votes
220k
views
A string expression can consist of a. a combination of character columns and literal values b. one or more literal values c. one or more character columns d. all of the above
CiochPep
asked
Oct 8, 2024
by
CiochPep
8.6k
points
Computers and Technology
high-school
1
answer
0
votes
38.4k
views
The process of planning and designing new WLANs for optimal performance, security and compliance typically involves: a. Penetration testing b. Wireless site survey c. Vulnerability scanning d. End user
Fkoessler
asked
Oct 8, 2024
by
Fkoessler
8.0k
points
Computers and Technology
high-school
1
answer
0
votes
217k
views
The general plan usually synopsizes information form the component plans as well as what other documents?
Bland
asked
Oct 8, 2024
by
Bland
8.1k
points
Computers and Technology
high-school
1
answer
0
votes
188k
views
What hashing algorithms can be used to hash passwords in the /etc/shadow file? 1. MD5 (MD5) 2. Blowfish (2a) 3. SHA-256 (5) 4. SHA-512 (6) 5. bcrypt (2y) 6. All the above
XMen
asked
Oct 8, 2024
by
XMen
8.3k
points
Computers and Technology
high-school
1
answer
5
votes
73.5k
views
What is different between VGA and HDMI
Blackjid
asked
Oct 8, 2024
by
Blackjid
7.7k
points
Computers and Technology
college
1
answer
1
vote
117k
views
Consider a hash table with 100 slots. collisions are resolved using chaining. assuming simple uniform hashing, what is the probability that the first 3 slots are unfilled after the first 3 insertions?
Ben Steffan
asked
Oct 8, 2024
by
Ben Steffan
7.9k
points
Computers and Technology
high-school
1
answer
3
votes
11.2k
views
Which of the following is not a valid privacy level for a Power BI data source? 1) Public 2) Confidential 3) Private 4) Organizational
Tuncay Elvanagac
asked
Oct 8, 2024
by
Tuncay Elvanagac
7.9k
points
Computers and Technology
high-school
1
answer
4
votes
66.3k
views
You are performing system testing of a train reservation system. Based on the test cases performed, you have noticed that the system occasionally reports that no trains are available,although this should
Ben Rhouma Moez
asked
Oct 8, 2024
by
Ben Rhouma Moez
7.7k
points
Computers and Technology
high-school
1
answer
5
votes
56.4k
views
EIGRP: Metric used by neighboring router that is advertising to this device. Ex. 20 A) Reported Metric B) Advertised Metric C) Neighbor Metric D) Incoming Metric
Vittore Marcas
asked
Oct 8, 2024
by
Vittore Marcas
8.0k
points
Computers and Technology
high-school
1
answer
4
votes
29.5k
views
TCP makes use to ______________ to enhance link utilization
Ashton Thomas
asked
Oct 8, 2024
by
Ashton Thomas
8.2k
points
Computers and Technology
high-school
1
answer
3
votes
137k
views
What is the default scope for variables inside of blocks?
TuanGeek
asked
Oct 8, 2024
by
TuanGeek
8.4k
points
Computers and Technology
high-school
1
answer
4
votes
169k
views
Which three attributes summarize DevOps (choose three)? a) Collaboration b) Automation c) Segmentation d) Continuous delivery
Lsmpascal
asked
Oct 8, 2024
by
Lsmpascal
8.1k
points
Computers and Technology
high-school
1
answer
1
vote
105k
views
What is the explanation of the statement 'Halstead metrics measure the program's lexical complexity'?
Suraj Shingade
asked
Oct 8, 2024
by
Suraj Shingade
7.9k
points
Computers and Technology
high-school
1
answer
4
votes
81.6k
views
What do the initials FTSE (pronounced Footsie)nstand for?
Maryokhin
asked
Oct 8, 2024
by
Maryokhin
8.0k
points
Computers and Technology
high-school
1
answer
5
votes
103k
views
In addition to audience recognition, effective technical communication demands what?
Ross Burton
asked
Oct 8, 2024
by
Ross Burton
8.0k
points
Computers and Technology
high-school
1
answer
5
votes
58.6k
views
Page:
« prev
1
...
964
965
966
967
968
969
970
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
Compare and contrast an electric generator and a battery??
is it true or false that after the american revolution conflicts in the northwest territory erupted between remaining british soldiers and native americans
Who made dutch claims in north america?
How did world war 1 affect the racial and ethnic makeup of american cities
Search QAmmunity.org