menu
QAmmunity.org
Recent questions in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions in Computers and Technology
What are two different types of memory analysis agents?
AstroBen
asked
Dec 3, 2024
by
AstroBen
9.3k
points
Computers and Technology
high-school
1
answer
1
vote
220k
views
Payroll settings are found on the Preferences menu under Your Company. a.True b.False
Mark Benningfield
asked
Dec 3, 2024
by
Mark Benningfield
8.6k
points
Computers and Technology
high-school
1
answer
1
vote
227k
views
Examples of security measures that can be used to protect data privacy on public/shared SOHO multifunction devices include user authentication and regular clearing of a printer's cache memory. (T/F)
Jack Miller
asked
Dec 3, 2024
by
Jack Miller
7.9k
points
Computers and Technology
high-school
1
answer
2
votes
202k
views
This operator can be used to find the intersection of two sets. & | - ^
Kyle Undefined
asked
Dec 3, 2024
by
Kyle Undefined
8.0k
points
Computers and Technology
high-school
1
answer
1
vote
164k
views
Which of the following keywords is an access control modifier? a. package b. private c. protected d. public
SentientBacon
asked
Dec 3, 2024
by
SentientBacon
7.6k
points
Computers and Technology
high-school
1
answer
5
votes
94.9k
views
Which technology allows users to view text content from images using an automated process? a) Optical Character Resolution (OCR) b) Image Text Decoder (ITD) c) Visual Text Processor (VTP) d) Image Content
Mhdjazmati
asked
Dec 3, 2024
by
Mhdjazmati
7.7k
points
Computers and Technology
high-school
1
answer
2
votes
95.3k
views
How are the folders organized in the paper mail cabinets?
The Segfault
asked
Dec 3, 2024
by
The Segfault
7.8k
points
Computers and Technology
high-school
1
answer
5
votes
91.6k
views
Why might users encounter difficulties updating the Windows Intelligence Update, specifically the Update for Windows Security Platform Antimalware Platform - KB5007651 (Version 1.0.2306.10002) in Windows
Winestone
asked
Dec 3, 2024
by
Winestone
8.5k
points
Computers and Technology
high-school
1
answer
3
votes
108k
views
You can use Availability Zones in Azure to protect Azure managed disks from a: A) Datacenter failure B) Region failure
Yuseferi
asked
Dec 3, 2024
by
Yuseferi
8.9k
points
Computers and Technology
high-school
1
answer
1
vote
91.6k
views
The subtotal of a customer’s order was $36.74 after using a coupon good for 15% off. Which of the following operations could be used to calculate the total price before the discount was applied? a) Add
Nanda Gopal
asked
Dec 3, 2024
by
Nanda Gopal
8.6k
points
Computers and Technology
high-school
1
answer
3
votes
85.6k
views
System failure can be caused by: A.Faulty design B. Faulty functionality C. Faulty manufacturing D. Operator error
Morteza Taghizadeh
asked
Dec 3, 2024
by
Morteza Taghizadeh
7.7k
points
Computers and Technology
college
1
answer
5
votes
16.6k
views
How can customers continue their connected services (SiriusXM Guardian or uConnect Access) subscription after the free trial expires? a) There is no option to continue the subscription; it ends after the
Greg Venech
asked
Dec 3, 2024
by
Greg Venech
8.3k
points
Computers and Technology
high-school
1
answer
5
votes
208k
views
The act of successfully sharing information between two people (or groups of people) so that the information is understood is called A) Communication B) Interpretation C) Clarification D) Comprehension
Lifeisbeautiful
asked
Dec 3, 2024
by
Lifeisbeautiful
8.2k
points
Computers and Technology
high-school
1
answer
2
votes
205k
views
The sell-side marketplace model is similar to the B2C model in which the buyer is expected to come to the seller's site, view catalogs, and place an order. True or False
Venu Duggireddy
asked
Dec 3, 2024
by
Venu Duggireddy
8.8k
points
Computers and Technology
high-school
1
answer
3
votes
145k
views
The many unsuccessful login attempts is a sure sign that the penetration tester is using a brute-force password cracking tool to gain access to the system. The Hydra and Medusa utilities are both capable
Harish ST
asked
Dec 3, 2024
by
Harish ST
8.1k
points
Computers and Technology
high-school
1
answer
5
votes
88.8k
views
What does the cycle process involve?
Shubham Tater
asked
Dec 3, 2024
by
Shubham Tater
8.1k
points
Computers and Technology
high-school
1
answer
2
votes
117k
views
Salesperson's license applicants must complete 30 hours of_____
Hardik Amal
asked
Dec 3, 2024
by
Hardik Amal
7.8k
points
Computers and Technology
high-school
1
answer
3
votes
207k
views
Which of the below is a file: A. data about one customer B. data about one inventory item C. a customer's name D. all inventory records
Michaellee
asked
Dec 3, 2024
by
Michaellee
8.0k
points
Computers and Technology
high-school
1
answer
1
vote
212k
views
The API can return _____ for use in the app or software programs. hackers information interfaces providers
Ljubomir
asked
Dec 3, 2024
by
Ljubomir
8.9k
points
Computers and Technology
high-school
1
answer
2
votes
230k
views
Explain the concept of bit depth in audio recordings. Then, listen to this 8-bit recording and this 32-bit recording and compare their quality.
Ibogolyubskiy
asked
Dec 3, 2024
by
Ibogolyubskiy
7.8k
points
Computers and Technology
high-school
1
answer
1
vote
226k
views
Page:
« prev
1
...
322
323
324
325
326
327
328
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
What is .725 as a fraction
Compare and contrast an electric generator and a battery??
is it true or false that after the american revolution conflicts in the northwest territory erupted between remaining british soldiers and native americans
Who made dutch claims in north america?
Search QAmmunity.org