menu
QAmmunity.org
Recent questions in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Register
Recent questions in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions in Computers and Technology
List questions you would be asking to software developers about the form. List potential risks if there are any with the form.
Ulises Layera
asked
Sep 18, 2023
by
Ulises Layera
6.0k
points
Computers and Technology
college
1
answer
4
votes
7.6k
views
Online communication allows people the ability to create new identities. People can switch genders, race, age, etc. since the visual and auditory cues used in face-to-face encounters are not used. Do you
Mshsayem
asked
Sep 18, 2023
by
Mshsayem
6.6k
points
Computers and Technology
college
1
answer
1
vote
151k
views
You are working as a network analyzer for an isp. a client has approached you to set up a network connection for a bank with offices around the state. the network needs to connect these offices with each
Jijo John
asked
Sep 18, 2023
by
Jijo John
6.2k
points
Computers and Technology
college
1
answer
0
votes
163k
views
Help! giving a lot of points I need this asap!
Ilias
asked
Sep 18, 2023
by
Ilias
6.2k
points
Computers and Technology
high-school
1
answer
23
votes
41.5k
views
The great Debators movie
Reservoirinvest
asked
Sep 18, 2023
by
Reservoirinvest
6.0k
points
Computers and Technology
high-school
1
answer
0
votes
23.2k
views
Identify four input devices that can convert hard copy pictures or into a digital format
Dlink
asked
Sep 18, 2023
by
Dlink
6.6k
points
Computers and Technology
college
1
answer
23
votes
180k
views
Question 8: It is important for a business to secure its computer data because: sensitive information and data could be corrupted or stolen by a competitor. o competitors play fair and will not steal information.
Brian Young
asked
Sep 18, 2023
by
Brian Young
7.1k
points
Computers and Technology
college
2
answers
3
votes
74.2k
views
Saar sets a password to gain access to his phone. His little brother figures it out and gets into his apps. Which part of the CIA triad was broken?
Malcom
asked
Sep 18, 2023
by
Malcom
6.2k
points
Computers and Technology
high-school
1
answer
1
vote
40.9k
views
Which type of input device can identify users based on their voice? KVM switch biometric identification device scanner digitizer
Natenho
asked
Sep 18, 2023
by
Natenho
6.3k
points
Computers and Technology
college
1
answer
4
votes
91.9k
views
True false the gramm-leach-bliley act addresses information security concerns in the financial industry
Drashti Dobariya
asked
Sep 18, 2023
by
Drashti Dobariya
5.9k
points
Computers and Technology
high-school
1
answer
3
votes
172k
views
Why would a loop be used to display where the letter B appears in this data set?
Sylar
asked
Sep 18, 2023
by
Sylar
6.4k
points
Computers and Technology
middle-school
2
answers
4
votes
111k
views
Abby has received a request for a data set of actual data for testing a new app that is being developed. She does not want the sensitive elements of the data to be exposed. What technology should she use
Guy Korland
asked
Sep 18, 2023
by
Guy Korland
5.9k
points
Computers and Technology
high-school
1
answer
21
votes
22.5k
views
Write a rainfall class that stores the total rainfall for each of 12 months into an array of doubles
Andrea Salicetti
asked
Sep 18, 2023
by
Andrea Salicetti
6.7k
points
Computers and Technology
high-school
1
answer
2
votes
229k
views
Select the correct answer. What does firewall software do? A. It improves network connectivity. B. It monitors network traffic to block malicious content. C. It adds some new features to the operating
Calvin Nunes
asked
Sep 18, 2023
by
Calvin Nunes
7.4k
points
Computers and Technology
high-school
2
answers
1
vote
45.1k
views
Which statements describe the effective use of graphics in presentations? Use lots of graphics to make a boring presentation more interesting. Use lots of graphics to make a boring presentation more interesting.
Mtgred
asked
Sep 18, 2023
by
Mtgred
5.9k
points
Computers and Technology
high-school
1
answer
16
votes
58.6k
views
What are the activities usually performed in database operations
Yaroslav Pogrebnyak
asked
Sep 18, 2023
by
Yaroslav Pogrebnyak
6.8k
points
Computers and Technology
college
1
answer
5
votes
217k
views
What can help to protect the data on your personal mobile device.
Sam Upra
asked
Sep 18, 2023
by
Sam Upra
5.9k
points
Computers and Technology
high-school
2
answers
11
votes
127k
views
4 Functions of Computer virus
Daniel Evans
asked
Sep 18, 2023
by
Daniel Evans
6.5k
points
Computers and Technology
college
1
answer
1
vote
7.7k
views
As an IT technician for your company, you are in the process of setting up several servers in your network. During the process, one of the servers is misconfigured and is, therefore, having trouble synchronizing
Sachaa
asked
Sep 18, 2023
by
Sachaa
6.6k
points
Computers and Technology
high-school
1
answer
5
votes
146k
views
What is a protocol implemented by other programs for secure computer-to-computer access?
MrDanA
asked
Sep 18, 2023
by
MrDanA
6.4k
points
Computers and Technology
high-school
1
answer
4
votes
148k
views
Page:
« prev
1
...
166
167
168
169
170
171
172
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
6.8m
questions
9.1m
answers
Other Questions
What values does atticus teach jem and scout?
What is the least common denominator of the four fractions 20 7/10 20 3/4 18 9/10 20 18/25
A pair of dice is rolled, and the number that appears uppermost on each die is observed. Refer to this experiment and find the probability of the given event. (Enter your answer as a fraction.) One die
North or south? during the civil war, the had the advantage of harboring 90 percent of the county's industries.
3/4x+5/6=5x-125/3 solve for x
Search QAmmunity.org