menu
QAmmunity.org
Recent questions in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions in Computers and Technology
one way that forensic examiners can protect themselves from outside biasing information is through a process that regulates the amount of information that examiners have access to so that it is only task
Rehan Ch
asked
Dec 27, 2024
by
Rehan Ch
8.5k
points
Computers and Technology
high-school
1
answer
2
votes
32.1k
views
What will happen if a non-recursive mutex is locked more than once ? a) Starvation b) Deadlock c) Aging d) Signaling
Sebataz
asked
Dec 27, 2024
by
Sebataz
7.7k
points
Computers and Technology
high-school
1
answer
2
votes
120k
views
Which of these constraints uses multiple fields as a primary key? A. foreign key B. unique C. composite key D. check
Mike Brennan
asked
Dec 27, 2024
by
Mike Brennan
8.5k
points
Computers and Technology
high-school
1
answer
5
votes
119k
views
Write an expression to detect if the first character of user input matches the first letter.
Rerezz
asked
Dec 27, 2024
by
Rerezz
8.3k
points
Computers and Technology
high-school
1
answer
1
vote
175k
views
When using CAD, buildings are drawn ______ and printed in an accepted architectural scale to fit the drawing sheets. 1) in actual size 2) in a scaled down size 3) in miniature 4) None of the above
Diwhyyyyy
asked
Dec 27, 2024
by
Diwhyyyyy
8.3k
points
Computers and Technology
high-school
1
answer
2
votes
97.6k
views
A controller communicates with applications in the application plane by using ________ ____ such as REST or OSGi. a) Southbound APIs b) Northbound APIs c) Eastbound APIs d) Westbound APIs
Kannan Suresh
asked
Dec 27, 2024
by
Kannan Suresh
8.6k
points
Computers and Technology
high-school
1
answer
0
votes
11.9k
views
Verom each drop-down menu. Raymond is assigned the task of backing up the data on a web server. However, he has limited storage place on the backup media.. Which type of backup should he choose and how
Brimstedt
asked
Dec 27, 2024
by
Brimstedt
8.2k
points
Computers and Technology
college
1
answer
5
votes
122k
views
Write a function that accepts a pointer to a C-string as its argument. The function should count the number of times the character 'w' occurs in the argument and return that number.
Synthaze
asked
Dec 27, 2024
by
Synthaze
8.9k
points
Computers and Technology
high-school
1
answer
4
votes
48.6k
views
In what language did Sydelle write her shorthand notes? 1) English 2) Spanish 3) French 4) German
Rahul Jiresal
asked
Dec 27, 2024
by
Rahul Jiresal
8.7k
points
Computers and Technology
high-school
1
answer
1
vote
84.0k
views
The digital yuan is giving Alipay a run for its money as the largest mobile payment network based in what country?
Angeant
asked
Dec 27, 2024
by
Angeant
8.4k
points
Computers and Technology
high-school
1
answer
4
votes
2.8k
views
The sizeof operator gives the size in number of _____ of any data type or variable
Ozan Kurt
asked
Dec 27, 2024
by
Ozan Kurt
7.7k
points
Computers and Technology
high-school
1
answer
1
vote
118k
views
What are these? security posture fabric coverage optimization a) Fortinet modules b) Fabric Connectors c) Fabric settings d) Fabric features
WtFudgE
asked
Dec 27, 2024
by
WtFudgE
8.6k
points
Computers and Technology
high-school
1
answer
4
votes
97.3k
views
Which legislation was passed by the federal government and allowed customers to purchase and own their own equipment in order to receive cable service?
Goke Obasa
asked
Dec 27, 2024
by
Goke Obasa
8.5k
points
Computers and Technology
high-school
1
answer
4
votes
71.3k
views
In class, we talked about the unsigned number representation, where each bit of a number has the following values: +32 + 16 +8 +4 +2 +1 We also talked about the two's complement representation, which is
Oscar F
asked
Dec 27, 2024
by
Oscar F
8.5k
points
Computers and Technology
college
1
answer
5
votes
165k
views
Methods that help encode and recall information through associations and images are called: a. Mnemonics b. Heuristics c. Algorithms d. Prototypes
Amal G Jose
asked
Dec 27, 2024
by
Amal G Jose
8.5k
points
Computers and Technology
high-school
1
answer
4
votes
51.3k
views
What is a N-tier model and how does it relate to server side dynamic web servers?
Mukesh S
asked
Dec 27, 2024
by
Mukesh S
8.7k
points
Computers and Technology
high-school
1
answer
2
votes
124k
views
What is the purpose of using nohup? 1) Automatically hang up the process after logout 2) Continue the process after logout 3)reate background process
Vikramjb
asked
Dec 27, 2024
by
Vikramjb
8.9k
points
Computers and Technology
high-school
1
answer
2
votes
139k
views
What is the purpose of the Procurement Data Standard (PDS) validation?
Hallelujah
asked
Dec 27, 2024
by
Hallelujah
9.3k
points
Computers and Technology
high-school
1
answer
3
votes
131k
views
I am looking for Powershell and Linux learning tools to download and help me with learning commands. Is there such a thing? Currently taking a course for IT Support Certification.
Sadi
asked
Dec 27, 2024
by
Sadi
7.7k
points
Computers and Technology
college
1
answer
4
votes
41.8k
views
Create a Two-Variable Data Table a. Open NationalHlpDsk.xlsx and save it with the name 5-NationalHlpDsk. b. Create a two-variable data table that calculates the average cost per call in the data table
Csabi
asked
Dec 27, 2024
by
Csabi
8.1k
points
Computers and Technology
high-school
1
answer
1
vote
26.8k
views
Page:
« prev
1
...
21
22
23
24
25
26
27
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
What is .725 as a fraction
Compare and contrast an electric generator and a battery??
What goal of the constitution was also a goal of the Magna Carta?
is it true or false that after the american revolution conflicts in the northwest territory erupted between remaining british soldiers and native americans
Who made dutch claims in north america?
Search QAmmunity.org