EduEase
Home
Register
Login
Master Computers and Technology with Fun Quizzes & Brain Teasers!
Computers And Technology
High School
License plate numbers in a certain state consists of seven characters. The first character is a digit (0 through 9). The next four characters are capital letters (A through Z) and the last two characters are digits. Therefore, a license plate number in this state can be any string of the form: Digit-Letter-Letter-Letter-Letter-Digit-Digit Required:a. How many different license plate numbers are possible?b. How many license plate numbers are possible if no digit appears more than once?
Computers And Technology
High School
Consider the following state of the system:Process Allocation Request AvailableA B C A B C A B CP0 0 0 0 5 5 3 2 3 2P1 2 0 0 3 2 2 P2 0 0 0 5 1 1 P3 2 1 1 5 2 2 P4 0 0 2 4 3 3 P5 0 0 0 4 1 2 P6 2 1 1 2 2 2 P7 0 0 2 4 3 5 P8 0 0 0 3 3 4P9 2 1 1 2 2 2Required: Detect whether there is a deadlock in this system.
Computers And Technology
High School
True/False: If a variable is defined as int sum; it may be written in the program code as sum or Sum, but not SUM. True False
Computers And Technology
High School
When using the Patch tool with the Source option selected in the Options bar, the original marquee contains the pixels that will be __________ when you move the marquee.
Computers And Technology
High School
Which fields in an IP packet header are examined by NetFlow to determine whether or not a given packet is part of a flow
Computers And Technology
High School
_______ are the most common standard for expressing databases, whereby tables (files) are related based on common keys.
Computers And Technology
High School
What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer
Computers And Technology
High School
In particular, a group of researchers, in 2008, made a quite devastating practical attack on MD5. They were able create a rogue Certificate Authority (CA) cert by abusing a collision. Take a look at the detailed analysis in [0] and briefly elaborate on how they were able to accomplish this attack and what the 'fallout' was from this with respect to TLS. Required:Why is it important to have a secure hashing function for this TLS enviornment?
Computers And Technology
High School
broadband connections After debuting in 1974, Xerox's Alto, a computer with a graphical user interface (GUI) navigated with a(n) ________, never caught on with the public. Later, Apple Macintosh computers' implementation of the (GUI) revolutionized human-computer interaction.
Computers And Technology
High School
If a Windows system starts reporting that the hard drive has a defective area, or read/write failures occur, you should
Computers And Technology
High School
True/False: When using Public Key Encryption, the message is encrypted after it is passed through the internet.
Computers And Technology
High School
How could you prevent a malicious attacker from engineering a switching loop from a host connected to a standard switch port?
Computers And Technology
High School
Can the UnitTest object be modified easily? As it is, it only initializes an answer key and calculates the percentage correct. Are there any other functions that you think a UnitTest may hold responsibility? Think about if you were writing a more robust program for actual teachers " what other functions may prove useful to them?
Computers And Technology
High School
Write a Bash shell script named move.sh. This script will be working with a data file named as the first argument to your script, so you would run it with the command: ./move.sh someFile.txt if I wanted it to work with the data inside the file someFile.txt. The data files your script will work with will contain lines similar to the following: Jane Smith,(314)314-1234,$10.00,$50.00,$15.00 Mark Hauschild,(916)-516-1234,$5.00,$75.00,$25.25 which indicate the amount someone donated in a particular month (over a 3 month period).
Computers And Technology
High School
The __________statement halts the processing of the web page and displays an error if an include file cannot be found.
Computers And Technology
High School
Write a function add_total_bedrooms(data) that returns a copy of data with an additional column called Bedrooms that contains the total number of bathrooms (as integers) for each house. Treat missing values as zeros if necessary. Remember that you can make use of vectorized code here; you shouldn't need any for statements.
Computers And Technology
High School
Write a complete program (Links to an external site.) that declares (Links to an external site.) an integer (Links to an external site.) variable (Links to an external site.), reads a value (Links to an external site.) from the keyboard into that variable (Links to an external site.), and writes to standard output (Links to an external site.) the variable (Links to an external site.)'s value (Links to an external site.), twice the value (Links to an external site.), and the square of the value (Links to an external site.), separated by spaces. Besides the numbers, nothing else should be written to standard output (Links to an external site.) except for spaces separating the values (Links to an external site.).
Computers And Technology
High School
You want to protect all the files on the hard drive of your Windows notebook system to prevent unauthorized access. You want to prevent access to any encrypted file on the hard drive, even if the hard drive is moved to another computer. Which feature should you implement
Computers And Technology
High School
Write the header of the method definition for a method named DisplayScores. The method takes two integer parameters, player1Score and player2Score. It displays the scores on the screen but does not return a value.
Computers And Technology
High School
Cloud computing refers to: A. replacing computing resources with services provided over the Internet. B. a technology that can make a single computer behave like many separate computers. C. designing computers with many microprocessors that work together, simultaneously, to solve problems.
Computers And Technology
High School
0.0% complete Question For the office network upgrade to Gigabit Ethernet, you need proper cabling. What is your choice of cabling to achieve at least 1 Gbps speed
Computers And Technology
High School
For each of the following problems: design an exhaustive search or optimization algorithm that solves the problem; describe your algorithm with clear pseudocode; and prove the time efficiency class of your algorithm.When writing your pseudocode, you can assume that your audience is familiar with the candidate generation algorithms in this chapter, so you can make statements like "for each subset X of S" without explaining the details of how to generate subsets.The Pythagorean triple problem is:input: two positive integers a, b with a < boutput: a Pythagorean triple (x, y, z) such that x, y and z are positive integers, a x y z b, andx2 +y2=z2 or None if no such triple exists.
Computers And Technology
High School
The Java API has a class called ArrayList and the Java API specifies the class as: Class ArrayList The class has a constructor that takes as input the number of elements that will be stored in the ArrayList. How would you create an instance of ArrayList that you are going to use to store 100 objects of type JFrame
Computers And Technology
High School
Write a program that simulates a lottery. The program should have an array of five integers named lottery, and should generate a random number in the range of 0 through 9 for each element in the array. The user should enter five digits which should be stored in an integer array named user. The program is to compare the corresponding elements in the two arrays and keep a count of the digits that match. For example, the following show the lottery array and the user array with sample numbers stored in each. There are two matching digits (elements 2 and 4).
« Previous
Page 103
Next »