menu
QAmmunity.org
Recent questions in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions in Computers and Technology
StringBuilder objects can be used in place of String objects if ________. a. the string data is not constant b. the string data size may grow c. the programs frequently perform string concatenation d.
Francisco Souza
asked
Oct 6, 2024
by
Francisco Souza
8.4k
points
Computers and Technology
high-school
1
answer
5
votes
138k
views
They wanted a basement and at least how many washrooms? a) 1 b) 2 c) 3 d) 4
Pillmuncher
asked
Oct 6, 2024
by
Pillmuncher
8.3k
points
Computers and Technology
high-school
1
answer
5
votes
209k
views
1) What does the following code do? Assume list is an array of int values, temp is some previously initialized int value, and c is an int initialized to 0. for (j=0; j < ; j++) if (list[j] < temp) c++; a) It finds the smallest value and stores it in temp b) It finds the largest value and stores it in temp c) It counts the number of elements equal to the smallest value in list d) It counts the number of elements in list that are less than temp e) It sorts the values in list to be in ascending order
Kyri Sarantakos
asked
Oct 6, 2024
by
Kyri Sarantakos
7.3k
points
Computers and Technology
high-school
1
answer
0
votes
156k
views
(Python) Max in list codeHS 7.3.6 HELP PLS ​
Tharindu Jayasinghe
asked
Oct 6, 2024
by
Tharindu Jayasinghe
7.9k
points
Computers and Technology
high-school
2
answers
5
votes
187k
views
How is a searchable rolling-restart initiated?
LostMohican
asked
Oct 6, 2024
by
LostMohican
8.4k
points
Computers and Technology
high-school
1
answer
0
votes
195k
views
What is a key difference between databases and a file-based approach to storing data?
Nadeem Khoury
asked
Oct 6, 2024
by
Nadeem Khoury
8.3k
points
Computers and Technology
high-school
1
answer
4
votes
19.1k
views
How to get date from datetime in sql
Justis Matotoka
asked
Oct 6, 2024
by
Justis Matotoka
8.0k
points
Computers and Technology
high-school
1
answer
5
votes
221k
views
Implement a four-input majority function using a 4-to-1 multiplex. The 4-input majority function is a function from four inputs to one output. The value of the operation is zero when two or more arguments
Larpo
asked
Oct 6, 2024
by
Larpo
8.5k
points
Computers and Technology
college
1
answer
4
votes
117k
views
Which of the following is a characteristic of Native TSO? A. It provides a full screen editor for updating datasets B. It provides a ready prompt to enter commands C. It provides a dataset list for editing
Hassan Jalil
asked
Oct 6, 2024
by
Hassan Jalil
8.0k
points
Computers and Technology
high-school
1
answer
2
votes
70.4k
views
Where does the crc originate in a network frame?
Fyodor Volchyok
asked
Oct 6, 2024
by
Fyodor Volchyok
8.7k
points
Computers and Technology
high-school
1
answer
3
votes
108k
views
Scotty is skilled at finding his way around an environment and does well judging relationships between objects in space. According to Gardner's theory of multiple intelligences, Scotty scores high in ____
Maxbublis
asked
Oct 6, 2024
by
Maxbublis
8.4k
points
Computers and Technology
high-school
1
answer
5
votes
116k
views
For RECA's purposes, how long from the date of issue is a certified criminal record check valid? A) 3 months. B) 6 months. C) 9 months. D) 12 months.
Knowledgeseeker
asked
Oct 6, 2024
by
Knowledgeseeker
8.1k
points
Computers and Technology
high-school
1
answer
4
votes
25.2k
views
What is the basic code you would need to define a named function that returns a value?
Jvilhena
asked
Oct 6, 2024
by
Jvilhena
8.9k
points
Computers and Technology
high-school
1
answer
4
votes
202k
views
Explain the service provided by kernel I/O sub system
Ognian Gloushkov
asked
Oct 6, 2024
by
Ognian Gloushkov
8.3k
points
Computers and Technology
high-school
1
answer
4
votes
190k
views
The idea of overlays is to (choose all that apply): a) Enable multiple processes execute at once b) Enable a process to be larger than the amount of memory allocated to it c) Keep in memory only those
Jaume Colom
asked
Oct 6, 2024
by
Jaume Colom
8.4k
points
Computers and Technology
high-school
1
answer
5
votes
35.6k
views
Is IPV6 to IPV6 communication is supported without load balancer? True or False
MShekow
asked
Oct 6, 2024
by
MShekow
8.1k
points
Computers and Technology
high-school
1
answer
3
votes
132k
views
It is critical that the crime scene be secure. Should computers be detached from the network in order to contain the crime scene? Option 1: Yes Option 2: No
Jeffy
asked
Oct 6, 2024
by
Jeffy
8.2k
points
Computers and Technology
high-school
1
answer
3
votes
162k
views
(adf, bdf, how='right', on='col1')
Chowlett
asked
Oct 6, 2024
by
Chowlett
7.9k
points
Computers and Technology
high-school
1
answer
5
votes
171k
views
What is the differences between INTEL and AMD processors​
KangarooRIOT
asked
Oct 6, 2024
by
KangarooRIOT
7.4k
points
Computers and Technology
college
1
answer
1
vote
144k
views
At what voltage level can static electricity cause destruction of data stored on hard drives? A. 1,500 B. 17,000 C. 40 D. 4,000
Careen
asked
Oct 6, 2024
by
Careen
8.6k
points
Computers and Technology
high-school
1
answer
1
vote
59.5k
views
Page:
« prev
1
...
993
994
995
996
997
998
999
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
Compare and contrast an electric generator and a battery??
What goal of the constitution was also a goal of the Magna Carta?
is it true or false that after the american revolution conflicts in the northwest territory erupted between remaining british soldiers and native americans
Who made dutch claims in north america?
Search QAmmunity.org