menu
QAmmunity.org
Recent questions in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions in Computers and Technology
The ____feature of Windows Installer provider a standard method for distributing components and ensures that the installed component is of the correct version. [A] VersionUpdate [B] CAB [C] Msi [D] Merge
Adavea
asked
Dec 26, 2024
by
Adavea
8.7k
points
Computers and Technology
high-school
1
answer
1
vote
5.5k
views
What type of object does Android use to display a layout in the process for the Home screen?
Maxfowler
asked
Dec 26, 2024
by
Maxfowler
8.3k
points
Computers and Technology
high-school
1
answer
1
vote
78.0k
views
Two practices that will reduce the file size of a published flash document
JaminSore
asked
Dec 26, 2024
by
JaminSore
7.6k
points
Computers and Technology
high-school
1
answer
3
votes
164k
views
Which of the following text page/emails is not a violation of privacy/confidentiality? A. Discussing patient details with a colleague B. Sharing patient information in a secure system C. Sending patient
Kareem Kamal
asked
Dec 26, 2024
by
Kareem Kamal
8.3k
points
Computers and Technology
high-school
1
answer
2
votes
56.7k
views
Which scanner type eliminates the need to manually place each individual page of a multi-page document in the device? (Select best answer) A. Barcode scanner B. QR scanner C. Flatbed scanner D. ADF scanner
Cremons
asked
Dec 26, 2024
by
Cremons
9.0k
points
Computers and Technology
high-school
1
answer
2
votes
73.0k
views
A segment of an array is defined as a collection of consecutive elements in that array. The length of a segment is the number of elements in the segment. A repeating segment is a segment with all the elements
Giorgio Balestrieri
asked
Dec 26, 2024
by
Giorgio Balestrieri
7.2k
points
Computers and Technology
high-school
1
answer
2
votes
137k
views
Name one reason why password complexity is a best practice.
Chugadie
asked
Dec 26, 2024
by
Chugadie
9.1k
points
Computers and Technology
high-school
1
answer
4
votes
87.7k
views
Which of the following reasons contribute to the video-game industry's continued reliance on sequels and licensing? a) A desire for innovation and originality. b) A focus on short-term profits. c) Strong
Twhb
asked
Dec 26, 2024
by
Twhb
8.7k
points
Computers and Technology
high-school
1
answer
4
votes
215k
views
Define the symbols and terms used in entity-relationship (E-R) diagrams.
ChosenOne Thabs
asked
Dec 26, 2024
by
ChosenOne Thabs
7.6k
points
Computers and Technology
high-school
1
answer
0
votes
73.9k
views
Which of the following websites would be considered the most credible and unbiased? (A) A website that is owned and operated by a political party (B) A website that is owned and operated by a news organization
Edney Holder
asked
Dec 26, 2024
by
Edney Holder
8.5k
points
Computers and Technology
high-school
1
answer
2
votes
22.5k
views
When a sender encrypts a message using their own private key, which security service is being provided to the recipient? a) Non-repudiation b) Availability c) Integrity d) Confidentiality
Bubba
asked
Dec 26, 2024
by
Bubba
8.4k
points
Computers and Technology
high-school
1
answer
5
votes
88.7k
views
The nCino Community is easily accessed from the homepage in which are?
Luis Delgado
asked
Dec 26, 2024
by
Luis Delgado
8.9k
points
Computers and Technology
high-school
1
answer
2
votes
95.9k
views
After which of these steps will you select a layout to insert a picture into a SmartArt shape? 1) Inserting the picture into the shape 2) Selecting a layout 3) Creating a SmartArt shape 4) None of the
Dcolazin
asked
Dec 26, 2024
by
Dcolazin
8.4k
points
Computers and Technology
high-school
1
answer
2
votes
38.5k
views
All values in Liquid are truthy except false. A. True B. False
YuliaUU
asked
Dec 26, 2024
by
YuliaUU
8.0k
points
Computers and Technology
high-school
2
answers
1
vote
121k
views
Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system? a. Brute force b. Phishing c. Pretexting
Scordo
asked
Dec 26, 2024
by
Scordo
8.8k
points
Computers and Technology
high-school
1
answer
0
votes
142k
views
Discuss the Surveillance and Performance Monitoring (SPM) module.
Adam Gent
asked
Dec 26, 2024
by
Adam Gent
8.1k
points
Computers and Technology
high-school
1
answer
1
vote
187k
views
Which keyboard shortcut is appropriate for adding a hyperlink to a Word document? Ctrl+C Ctrl+P Ctrl+K Ctrl+G
Akash Karnatak
asked
Dec 26, 2024
by
Akash Karnatak
7.9k
points
Computers and Technology
college
1
answer
5
votes
76.6k
views
Insignificant zeros are displayed for numeric columns by default to show two decimal places. A) True B) False
Sajjad Aemmi
asked
Dec 26, 2024
by
Sajjad Aemmi
7.4k
points
Computers and Technology
high-school
1
answer
3
votes
30.1k
views
The health monitor stores 4 MiB of data. Construct ari expression to show how many bits are in 4 MiB.
Sonicsmooth
asked
Dec 26, 2024
by
Sonicsmooth
7.9k
points
Computers and Technology
high-school
1
answer
1
vote
148k
views
Which of the following was invented in the 1950s and contributed to changing human life permanently? O television the Global Positioning System (GPS) Bluetooth the smartphone 2
Peto
asked
Dec 26, 2024
by
Peto
8.1k
points
Computers and Technology
college
1
answer
3
votes
5.1k
views
Page:
« prev
1
...
30
31
32
33
34
35
36
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
What is .725 as a fraction
Compare and contrast an electric generator and a battery??
What goal of the constitution was also a goal of the Magna Carta?
is it true or false that after the american revolution conflicts in the northwest territory erupted between remaining british soldiers and native americans
Search QAmmunity.org