Study Buddy
Home
Search
Login
Search
Computers and Technology
Computers And Technology
College
the distinction between application and infrastructure security: application security is designed to resist attacks. infrastructure security is the software configured to resist attacks
Computers And Technology
High School
what feature is used on memory slots and modules to prevent modules from being inserted incorrectly?
Computers And Technology
College
Build an AVL tree from the following values, which value is the first to become the Alpha node? 35, 49, 22, 27, 64, 60 O 35 O 60 O 64 O 49 O 27 O 22
Computers And Technology
High School
Which of the following best describes the ability of parallel computing solutions to improve efficiency?answer choicesAny problem that can be solved sequentially can be solved using a parallel solution in approximately half the time.Any solution can be broken down into smaller and smaller parallel portions, making the improvement in efficiency theoretically limitless as long as there are enough processors available.The efficiency of parallel computing solutions is rarely improved over the efficiency of sequential computing solutions.The efficiency of a solution that can be broken down into parallel portions is still limited by a sequential portion.
Computers And Technology
College
what is the bounce rate?
Computers And Technology
College
Which of the following are defined as correspondence?I Written letter to a clientII E-mailIII Instant messageIV Group e-mailA. I onlyB. II and IV onlyC. I, II, III onlyD. I, II, III, IV
Computers And Technology
College
Build a 2-3 Tree using the following values. After the tree is built, what value(s) is/are in the root? 27 49 19 24 39 71 48 44 27 44 71 39 19 88 24 49 38
Computers And Technology
High School
which route 53 routing policies would you use to route traffic to multiple resources in proportions that you specify?
Computers And Technology
College
Tony, a system administrator, set up a printer on John's workstation. During the setup, Tony was able to print a test page. Later, when John attempted to print a document, an error message was displayed that indicates access was denied to the printer. John tried to restart the printer and workstation, but the same error message is displayed when he attempts to print a document. Which of the following MOST likely caused this issue?Options are :O The user lacks adequate security permissions to the printer (Correct)O The printer lacks the memory required to process the documentO The print spooler is hung and must be restartedO The printer is offline
Computers And Technology
High School
which statement is true of data marts and data warehouses? a. consolidating information from different departments is easier in data marts than in data warehouses. b. data marts have more extended scope than data warehouses. c. data marts usually perform the same types of analysis as data warehouses. d. access to data is often slower in data marts than in data warehouses.
Computers And Technology
College
Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI on the right. Each option on the left can be used more than once. Presentation LayerData Link layer Application layer Session layer Network layer Transport layer NetworkTransport Application Transport Internetwork
Computers And Technology
College
given the following javascript function, which of the following is not a possible result? select all that apply. function tossit(){ return math.random() 1; }O 0.5 O O O 1 O 0.8923871
Computers And Technology
High School
Digital content management is one application of technology O private cloudO blockchain O nano O AI
Computers And Technology
College
A website developer is working on a new e-commerce website and has asked an information security expert for the most appropriate way to store credit card numbers to create an easy reordering process. Which of the following methods would BEST accomplish this goal?A. Salting the magnetic strip informationB. Encrypting the credit card information in transitC. Hashing the credit card numbers upon entryD. Tokenizing the credit cards in the database
Computers And Technology
College
which of the following are examples of data objects that a relational database management system (rdbms) may include? more than one answer may be correct.
Computers And Technology
High School
x = 5def draw(canvas): ________ x = x + 5 canvas.draw_circle((x,200), 50, 1, color, color)
Computers And Technology
College
question 6 :you are the network administrator for your organization. you are asked by a junior administrator when he should create restore points. which of the following are times when restore points should be created?
Computers And Technology
High School
to create a(n) grid, you design a webpage that uses a grid or columns. question 17 options: a. fluid b. indexed c. coded d. cast
Computers And Technology
High School
question 7 a router is performing basic routing functions. what is the second step in the transmission of a packet?
Computers And Technology
High School
What two move commands are used in mcl language and what is the difference between them?
Computers And Technology
High School
suppose the keys 3, 4, 45, 21, 92, 12 are inserted into a bst in this order. what is the preorder traversal of the elements after deleting 45 from the tree?
Computers And Technology
High School
Which of the choices below are NOT a function of the Operating system.a. It controls the memory needed for various processes.b. It controls peripheral devices.c. It controls the booting of a computer.d. It manages the user's communication with the computer.Till linging information.
Computers And Technology
College
Write a function that displays the following triangle pattern of asterisks whose lines is specified in integer parameter side. For example, if side is 4, the function displays the following ****************
Computers And Technology
College
which of the following works of art is from south america? how to: items can be selected or deselected by clicking anywhere on the box. selected items are highlighted in blue. O 1O 2O 3O 4
« Previous
Page 45
Next »