menu
QAmmunity.org
Recent questions in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions in Computers and Technology
How to received email in plain text instead of html
Rdgd
asked
Oct 6, 2024
by
Rdgd
8.6k
points
Computers and Technology
high-school
1
answer
3
votes
200k
views
6.36 lab: subtracting list elements from max - functions when analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. this can be done by normalizing
Milan Tenk
asked
Oct 6, 2024
by
Milan Tenk
8.2k
points
Computers and Technology
high-school
2
answers
0
votes
10.7k
views
LSIP machines are also known as: a) AI workstations b) Time-sharing terminals c) Super minicomputers d) All of the above
Oleg Tarasov
asked
Oct 6, 2024
by
Oleg Tarasov
8.2k
points
Computers and Technology
high-school
1
answer
5
votes
69.4k
views
To avoid mishandling of information (electronics or documents), what should you consider using? A. Labeling B. Token C. Tickets D. SLL
Lightalloy
asked
Oct 6, 2024
by
Lightalloy
8.0k
points
Computers and Technology
high-school
1
answer
5
votes
158k
views
A disadvantage of Heapsort is: a. It is not stable (i.e., records with equal keys might not remain in the same order after sorting) b. None of these answers c. Its average case running time is O(n²) d.
DeejonZ
asked
Oct 6, 2024
by
DeejonZ
8.6k
points
Computers and Technology
high-school
1
answer
5
votes
46.6k
views
Which of the following is a web server? A. NetBeans B. Apache Tomcat C. Eclipse D. Microsoft Word
Agregoire
asked
Oct 6, 2024
by
Agregoire
7.2k
points
Computers and Technology
high-school
1
answer
5
votes
94.5k
views
Hierarchy of Specification in the Design of Authentication and Key Exchange Protocols a) Outlines steps for key exchange b) Describes the structure of authentication protocols c) Establishes a ranking
Sodawillow
asked
Oct 6, 2024
by
Sodawillow
8.6k
points
Computers and Technology
high-school
1
answer
0
votes
172k
views
What is the maximum command percentage, if any, of Must Promote recommendations a leader is authorized to give Sailors E4 and below? A) 60% to include Early Promotes B) 10% C) No limit D) 20%
Teppic
asked
Oct 6, 2024
by
Teppic
7.9k
points
Computers and Technology
high-school
1
answer
4
votes
74.0k
views
Which of the following is/are true of the IPOS cycle? a) Once words, numbers or images are entered, a computer processes the data into useable information that can then be accessed to answer questions
Eduardo Matsuoka
asked
Oct 6, 2024
by
Eduardo Matsuoka
8.1k
points
Computers and Technology
high-school
1
answer
3
votes
68.0k
views
What are some benefits that Knowledge Product Entitlement provides? (Choose 3) A. Reduces call volume B. Makes it easier for Agents to manage case volume C. Allows access to Knowledge Articles that are
Iva Kam
asked
Oct 6, 2024
by
Iva Kam
8.3k
points
Computers and Technology
high-school
1
answer
3
votes
1.2k
views
a parameter array . group of answer choices is declared using the keyword params can accept any number of arguments of the same data type
Mitch Blevins
asked
Oct 6, 2024
by
Mitch Blevins
7.9k
points
Computers and Technology
high-school
1
answer
4
votes
88.9k
views
At minimum, how far must tabletop equipment be raised if it's not sealed to the counter? A) 1 inch B) 2 inches C) 3 inches D) 4 inches
Dafie
asked
Oct 6, 2024
by
Dafie
9.2k
points
Computers and Technology
high-school
1
answer
3
votes
140k
views
Bar-coding of instrument sets is an integral part of: a) Inventory management b) Quality control c) Order processing d) Supply chain logistics
Scott Robinson
asked
Oct 6, 2024
by
Scott Robinson
8.6k
points
Computers and Technology
high-school
1
answer
4
votes
4.3k
views
Write the equivalent translation of STMEA operation using IA,IB, DA, and DB suffixes
Robert Hacken
asked
Oct 6, 2024
by
Robert Hacken
8.0k
points
Computers and Technology
high-school
1
answer
4
votes
145k
views
What did you include in your response? check all that apply. -to transmit data -to transmit tv signals -to transmit telephone signals -to cook in microwave ovens to use radar
Skytaker
asked
Oct 6, 2024
by
Skytaker
7.5k
points
Computers and Technology
high-school
1
answer
3
votes
195k
views
Suppose that you decide to use the capture - recapture method to estimate the size of a network. The size of the first sample (the "marked sample") is 100 nodes, the size of the second sample is 150 nodes,
Perrako
asked
Oct 6, 2024
by
Perrako
8.0k
points
Computers and Technology
high-school
1
answer
3
votes
221k
views
Which object type is automatically created when you register an application in microsoft entra id?
GabCas
asked
Oct 6, 2024
by
GabCas
8.4k
points
Computers and Technology
high-school
1
answer
1
vote
178k
views
ohn, a support analyst, is tasked with preparing a document on msds. what should the documentation include?
AntonioHS
asked
Oct 6, 2024
by
AntonioHS
9.3k
points
Computers and Technology
high-school
1
answer
5
votes
27.2k
views
In coco who said “Estás flaco mijo, hay que comer más.”
Guy Nesher
asked
Oct 6, 2024
by
Guy Nesher
8.5k
points
Computers and Technology
high-school
1
answer
5
votes
70.1k
views
Would you rather find a weak positive or a strong negative correlation
Rawle
asked
Oct 6, 2024
by
Rawle
9.0k
points
Computers and Technology
high-school
1
answer
4
votes
55.0k
views
Page:
« prev
1
...
990
991
992
993
994
995
996
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
What is .725 as a fraction
Compare and contrast an electric generator and a battery??
What goal of the constitution was also a goal of the Magna Carta?
Who made dutch claims in north america?
Search QAmmunity.org