menu
QAmmunity.org
Recent questions in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions in Computers and Technology
Interpret the hexadecimal bit pattern 0xffd9 as a 16-bit 2's complement number. What is its decimal value? (d) Suppose that n is a negative integer represented as a k-bit 2 's complement bit pattern. If
Evis
asked
Dec 4, 2024
by
Evis
8.8k
points
Computers and Technology
high-school
1
answer
1
vote
223k
views
In an efficiently designed relational database, what does every table have? a) Index b) Trigger c) Schema d) Primary Key
Hilalkah
asked
Dec 4, 2024
by
Hilalkah
8.8k
points
Computers and Technology
high-school
1
answer
0
votes
188k
views
What can a form in an Access database be used for? A. Entering data B. Menu system C. Displaying data D. All of the above E. None of the above
Gleba
asked
Dec 4, 2024
by
Gleba
7.7k
points
Computers and Technology
high-school
1
answer
1
vote
94.6k
views
calls a user defined function int getintegerinput(string prompt, int min, int max) that prompts the user for input and gets valid integer input from the user. the function should:
Donavon Yelton
asked
Dec 4, 2024
by
Donavon Yelton
8.3k
points
Computers and Technology
high-school
1
answer
1
vote
164k
views
It is important to protect the WI-FI network because the access that criminals could have could be very damaging to victims. If thieves get the right information then they could steal vital information
Kenston Choi
asked
Dec 4, 2024
by
Kenston Choi
8.5k
points
Computers and Technology
college
1
answer
2
votes
130k
views
According to the systems viewpoint, what are three types of inputs? 1) Data, information, and knowledge 2) Hardware, software, and data 3) Input, processing, and output 4) Analog, digital, and hybrid 5)
Valeriy Van
asked
Dec 4, 2024
by
Valeriy Van
7.9k
points
Computers and Technology
high-school
1
answer
2
votes
127k
views
"IF YOU STEAL, I'LL REPORT 'The False Gems.' Create an outline of five key ideas you have read so far. Type your response below using the format shown below. Summary Outline Task: To summarize five key
Pere Villega
asked
Dec 4, 2024
by
Pere Villega
8.4k
points
Computers and Technology
high-school
1
answer
4
votes
21.5k
views
The most important security models and research properties that secure a system is_______
Carson
asked
Dec 4, 2024
by
Carson
8.9k
points
Computers and Technology
high-school
1
answer
0
votes
153k
views
_________ of the right to privacy might argue that a department store with video cameras violates an implicit contract with its patrons, but does not violate a supposed right to privacy. a. Those who are
Eadjei
asked
Dec 4, 2024
by
Eadjei
8.2k
points
Computers and Technology
college
1
answer
2
votes
146k
views
PLS HELP A computer program will subtract two numbers entered. Which set of data contains the correct output? a) first number 4, second number 4, output 0 b) first number 5, second number 3, output 15
Hlopko
asked
Dec 4, 2024
by
Hlopko
8.0k
points
Computers and Technology
college
1
answer
4
votes
53.8k
views
Which of the following actions is not recommended for keeping you computer cool?
Ranjjose
asked
Dec 4, 2024
by
Ranjjose
8.0k
points
Computers and Technology
high-school
1
answer
0
votes
88.7k
views
Rank the type of computer from largest to smallest in size and capability. a. Supercomputer - Mainframe - Personal Computer (PC) - Minicomputer b. Supercomputer - Minicomputer - Mainframe - Personal Computer
Snivio
asked
Dec 4, 2024
by
Snivio
8.1k
points
Computers and Technology
high-school
1
answer
1
vote
154k
views
What is the difference between an HTML class attribute and an HTML id attribute? a) Class is for styling, and id is for scripting b) Class is for individual elements, and id is for groups of elements c)
Viljami
asked
Dec 4, 2024
by
Viljami
8.2k
points
Computers and Technology
high-school
1
answer
4
votes
215k
views
If you want to import just the Component from the React library, what syntax do you use?
ManuQiao
asked
Dec 4, 2024
by
ManuQiao
8.2k
points
Computers and Technology
high-school
1
answer
2
votes
153k
views
Variable method for defining Fixed OVH and what it means?
Voy
asked
Dec 4, 2024
by
Voy
9.4k
points
Computers and Technology
high-school
1
answer
2
votes
160k
views
What applications should be accessed at the start of every shift? a. Vaisala HAR page b. Blinklink website c. All the above d. SunGuide Event Manager
AYESIGYE DERRICK
asked
Dec 4, 2024
by
AYESIGYE DERRICK
7.4k
points
Computers and Technology
high-school
1
answer
2
votes
170k
views
Write the function in terms of the cofunction of a complementary angle. cot pi/5
Vanilla Face
asked
Dec 4, 2024
by
Vanilla Face
8.1k
points
Computers and Technology
high-school
1
answer
0
votes
11.5k
views
Which of following in the context diagram are used to represent a user's interaction with the system? A. Users of the software and actors B. Actors and use cases C. Software system and other external entities
Lapys
asked
Dec 4, 2024
by
Lapys
8.6k
points
Computers and Technology
high-school
1
answer
0
votes
206k
views
A series of steps for playing Uno is shown. What card got played at step three? A) Skip card B) Reverse card C) Draw 2 card D) Wild card
KTT
asked
Dec 4, 2024
by
KTT
7.6k
points
Computers and Technology
high-school
1
answer
3
votes
60.3k
views
Types of Default-Contingent Signals (2)
KMA Badshah
asked
Dec 4, 2024
by
KMA Badshah
8.9k
points
Computers and Technology
high-school
1
answer
5
votes
203k
views
Page:
« prev
1
...
308
309
310
311
312
313
314
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
What is .725 as a fraction
Compare and contrast an electric generator and a battery??
Who made dutch claims in north america?
How did world war 1 affect the racial and ethnic makeup of american cities
Search QAmmunity.org