menu
QAmmunity.org
Recent questions in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Register
Recent questions in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions in Computers and Technology
With the age of technology on the rise, we are always constantly online. As we surf the web, websites take our data and use it for their personal gains. Even though we accept the terms and agreement, do
Alexander Taylor
asked
Aug 22, 2022
by
Alexander Taylor
5.7k
points
Computers and Technology
middle-school
2
answers
2
votes
206k
views
You use the same finger to click the enter and backspace key. 1. True 2. False
Modou
asked
Aug 22, 2022
by
Modou
5.7k
points
Computers and Technology
high-school
2
answers
3
votes
93.8k
views
Write a java program for the following A student will not be allowed to sit in exam if his/her attendance is less than 75% . Take the following input from user Number of classes held Number of classes
Oxymoron
asked
Aug 22, 2022
by
Oxymoron
5.7k
points
Computers and Technology
college
1
answer
7
votes
190k
views
The advantage of a digital camera in taking nighttime photographs is that you can see the results right away. • True © False
Danielfishr
asked
Aug 22, 2022
by
Danielfishr
5.5k
points
Computers and Technology
high-school
1
answer
1
vote
56.1k
views
A strategy that adopts interface standards that are defined by and widely used throughout industry to facilitate the update of components with new technology is __________. Open systems Non-developmental
Crafter
asked
Aug 22, 2022
by
Crafter
5.3k
points
Computers and Technology
college
1
answer
1
vote
13.7k
views
Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be
Tairan
asked
Aug 22, 2022
by
Tairan
5.3k
points
Computers and Technology
college
1
answer
2
votes
16.6k
views
Which of the following component display the content of active cells
Graydyn Young
asked
Aug 22, 2022
by
Graydyn Young
5.1k
points
Computers and Technology
college
1
answer
4
votes
7.1k
views
Let L be the set of exactly those strings over the alphabet \Sigma = {a, b, c, g}, that satisfy all of the following properties: the length of the string is equal to 5n+3, for some natural number n greater
Rhoda
asked
Aug 22, 2022
by
Rhoda
5.1k
points
Computers and Technology
college
1
answer
0
votes
32.4k
views
Which of the following CALL instructions writes the contents of EAX to standard output as a signed decimal integer? a. call WriteInteger b. call WriteDec c. call WriteHex d. call WriteInt
Abir
asked
Aug 22, 2022
by
Abir
5.9k
points
Computers and Technology
college
1
answer
2
votes
182k
views
What are the process of boots up a computer?
Forge Web Design
asked
Aug 22, 2022
by
Forge Web Design
5.2k
points
Computers and Technology
college
2
answers
3
votes
50.1k
views
Define computer system and four basic operation
Brigida
asked
Aug 22, 2022
by
Brigida
6.2k
points
Computers and Technology
college
1
answer
3
votes
56.0k
views
A finite set of values along with set of rules for permissible operations is called ______ Data type Class Methods
David Le Borgne
asked
Aug 22, 2022
by
David Le Borgne
6.1k
points
Computers and Technology
high-school
2
answers
3
votes
204k
views
what is the term used to describe the situation when a derieved class provides a function already provided in the bae class
Povilasp
asked
Aug 22, 2022
by
Povilasp
4.8k
points
Computers and Technology
high-school
1
answer
0
votes
209k
views
Who here knows how to code?
Andrewhl
asked
Aug 22, 2022
by
Andrewhl
5.1k
points
Computers and Technology
middle-school
2
answers
5
votes
116k
views
Explain any one method of creating a presentation.
TechFanatic
asked
Aug 22, 2022
by
TechFanatic
5.0k
points
Computers and Technology
high-school
1
answer
16
votes
148k
views
It is the way to convey a message,an idea,a picture,or speech that is received and understood clearly and correctly by the person for whom it is sent.
Sergey Kamardin
asked
Aug 22, 2022
by
Sergey Kamardin
5.8k
points
Computers and Technology
high-school
1
answer
1
vote
212k
views
What is the definition of stream cipher? A. Cryptography wherein two keys are used: one to encrypt the message and another to decrypt it B. A cryptographic method in which someone chooses a number by which
Greg Howell
asked
Aug 22, 2022
by
Greg Howell
5.5k
points
Computers and Technology
high-school
1
answer
4
votes
26.5k
views
Do you believe people or more or less ethical then they were fifty years ago?
Jesususo
asked
Aug 22, 2022
by
Jesususo
5.7k
points
Computers and Technology
high-school
1
answer
4
votes
220k
views
Which of these set of instructions will create a new blank document
Ozan Yurtsever
asked
Aug 22, 2022
by
Ozan Yurtsever
5.4k
points
Computers and Technology
college
1
answer
4
votes
64.9k
views
Does anyone know this answer
Arun G
asked
Aug 22, 2022
by
Arun G
5.7k
points
Computers and Technology
high-school
1
answer
3
votes
19.4k
views
Page:
« prev
1
...
964
965
966
967
968
969
970
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
5.9m
questions
7.7m
answers
Other Questions
In the mid-1700s, which industrializing nation was the dominant commercial power in the atlantic ocean?
Solve for y in terms of x. 2/3y - 4 = x y = x + 6 y = -x + 4 y = -x + 6 y = x + 4
Which type of anxiety plays a key role in many cases of erectile dysfunction?
Felipe no está triste. Está _____. estomago cama sintomas dolor content consultorio tranquilo nerviosas resfriado la boca
Aliyah has $24 to spend on seven pencils. After buying them she had $10. How much did each pencil cost?
Search QAmmunity.org