menu
QAmmunity.org
Recent questions in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Register
Recent questions in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions in Computers and Technology
Which of the following are examples of security threats? Select all of the boxes that apply. antivirus software bugs power surges theft of hardware
Harmeet
asked
Jul 18, 2023
by
Harmeet
6.0k
points
Computers and Technology
high-school
2
answers
4
votes
30.6k
views
I have no clue how to find my recently viewed imaged on my windows 10. Please help!
Tor Arne
asked
Jul 18, 2023
by
Tor Arne
6.4k
points
Computers and Technology
college
1
answer
3
votes
201k
views
write a recursive bool valued function containsvowel that accepts a string and returns true if the string contains a vowel
Pakii
asked
Jul 18, 2023
by
Pakii
6.5k
points
Computers and Technology
high-school
1
answer
20
votes
29.9k
views
Kevin, a manager at FitPlus fitness club, owns a website that updates information regarding his fitness club. He created background gradients by tiling gradient images across a page or element. Now, he
Ali Kashanchi
asked
Jul 18, 2023
by
Ali Kashanchi
6.6k
points
Computers and Technology
high-school
1
answer
2
votes
226k
views
Dust, dirt, or metal chips can pose a potential ____ injury risk in a shop. [You Chose] HeadBodyLegEye
Yoeli
asked
Jul 18, 2023
by
Yoeli
6.6k
points
Computers and Technology
college
1
answer
4
votes
102k
views
Why do designers of smartphones hide computer processing details from you? A. So you can talk longer on the phone B. So you can focus on otherthings C. So you can buy more phones O D. So you can sleep
Ivor
asked
Jul 18, 2023
by
Ivor
6.8k
points
Computers and Technology
high-school
2
answers
14
votes
75.5k
views
Assume a system has a TLB hit ratio of 99%. It requires 10 nanoseconds to access the TLB, and 90 nanoseconds to access main memory. What is the effective memory access time in nanoseconds for this system
Rhinoinrepose
asked
Jul 18, 2023
by
Rhinoinrepose
6.7k
points
Computers and Technology
high-school
1
answer
18
votes
192k
views
75 POINTS!! PLS HURRY Choose the term that best completes each sentence. ___are intentional attacks on a system with the intent to do harm. a. cyberthreats b. malware ___ may be intentional like a virus
Hamish Carpenter
asked
Jul 18, 2023
by
Hamish Carpenter
7.2k
points
Computers and Technology
high-school
1
answer
6
votes
52.3k
views
Hey could someone please explain this to me and give me an example? Or an outline of how to program it.
Marmeladze
asked
Jul 18, 2023
by
Marmeladze
6.3k
points
Computers and Technology
college
1
answer
2
votes
102k
views
] 1. Which file type should she use to print the pictures?
Adamdsmith
asked
Jul 18, 2023
by
Adamdsmith
5.8k
points
Computers and Technology
college
1
answer
0
votes
118k
views
Who made the game Monopoly???
Pierre Bourdon
asked
Jul 18, 2023
by
Pierre Bourdon
6.7k
points
Computers and Technology
high-school
1
answer
14
votes
199k
views
A framework for all of the entities involved in digital certificates for digital certificate management is known as:
Rashidah
asked
Jul 18, 2023
by
Rashidah
7.1k
points
Computers and Technology
high-school
1
answer
17
votes
102k
views
What is a virus in a computer
Niki Tonsky
asked
Jul 18, 2023
by
Niki Tonsky
6.3k
points
Computers and Technology
college
2
answers
10
votes
112k
views
How do I fix when it hits the second session it skips scanf. #include <stdio.h> #include <unistd.h> #include <ctype.h> main() { double first, second; while(1){ printf(" Calculator\\"); printf("\\ 7 8 9 / \\ 4 5 6 x \\ 1 2 3 -
Paul Whelan
asked
Jul 18, 2023
by
Paul Whelan
6.8k
points
Computers and Technology
high-school
1
answer
3
votes
162k
views
write a c recursive function that finds the maximum value in an array (or vector) of integers without using any loops. you may assume the array will always contain at least one integer. do not modify the
Vexe
asked
Jul 18, 2023
by
Vexe
6.3k
points
Computers and Technology
high-school
1
answer
4
votes
75.2k
views
Algorithm to eat orange
Asn
asked
Jul 18, 2023
by
Asn
6.9k
points
Computers and Technology
high-school
2
answers
21
votes
52.8k
views
What is the newest code language?
Michael Arrison
asked
Jul 18, 2023
by
Michael Arrison
6.3k
points
Computers and Technology
high-school
2
answers
4
votes
77.1k
views
generally, ( mouse,keyboard,hard disk,pen drive) can't be removed from the computer ? choose the correct answer
Delroh
asked
Jul 18, 2023
by
Delroh
6.9k
points
Computers and Technology
college
2
answers
7
votes
177k
views
Gabriel wants brain food for dinner the night before his final exam. What is best for him to eat? fried chicken and onion rings burgers and ice cream pizza and cookies grilled chicken and vegetables.
Daniel Bubenheim
asked
Jul 18, 2023
by
Daniel Bubenheim
7.0k
points
Computers and Technology
high-school
2
answers
14
votes
117k
views
Can development and conservation of environment go hand-in-hand? Explain your point of view
Ali Ozkara
asked
Jul 18, 2023
by
Ali Ozkara
6.5k
points
Computers and Technology
high-school
1
answer
25
votes
39.3k
views
Page:
« prev
1
...
268
269
270
271
272
273
274
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
7.4m
questions
9.9m
answers
Other Questions
What goal of the constitution was also a goal of the Magna Carta?
How did world war 1 affect the racial and ethnic makeup of american cities
Who was the boy who became king at the age of 9?
Which of the objects is living or nonliving: Bacteria, virus, moss, you, a lemon seed, the air, bread, lettuce and rocks?
Why aren't all minerals gemstones?
Search QAmmunity.org