Study Savvy
Home
Register
Login
Ultimate Computers and Technology Study Guide - Questions & Answers
Computers And Technology
College
The default view that PowerPoint opens in is called ____ view.a. Slideb. Normalc. Standardd. Edit
Computers And Technology
High School
29.the data suggests that global climate change stems from what human activity? a)burning of fossil fuels b)depleting the ozone layer c)the burying of toxic wastes d)the incineration of municipal wastes e)a and b but not c and d
Computers And Technology
College
Your friend is trying out your new password generator program. She wants to know how it works. How would you explain it to her? Keep in mind that she does not know Python code. Make sure to use good communication techniques. k12
Computers And Technology
High School
hajar is responsible for keeping her banking institution's servers operating 24/7/365. her recovery strategy is to have fully redundant or duplicate operations and synchronized data and to operate the site continuously. which strategy has she selected?
Computers And Technology
High School
By following a structured troubleshooting approach, a network administrator identified a network issue after a conversation with the user. What is the next step that the administrator should take?a. Verify full system functionality.b. Test the theory to determine cause.c. Establish a theory of probable causes.d. Establish a plan of action to resolve the issue.
Computers And Technology
High School
import is a built-in function that accepts the name of a module as an argument and loads its functions, variables, and other definitions.T/F
Computers And Technology
High School
juan, a cybersecurity expert, has been hired by an organization whose networks have been compromised by a malware attack. after analyzing the network systems, juan submits a report to the company mentioning that the devices are infected with malware that uses a split infection technique on files. which malware attack is juan reporting?
Computers And Technology
High School
you are an intune administrator in an it organization. you have 10 computers that run windows 10 pro. these computers are joined to microsoft azure active directory (ad) and enrolled in microsoft intune. you need to upgrade these computers to windows 10 enterprise. what should you configure in microsoft intune to accomplish this task?
Computers And Technology
High School
what medical procedure involve inserting a catheter from an artery in the groin to the site where blood flow is rescticted
Computers And Technology
High School
for the tri-color garbage collection algorithm. which set holds only garbage at the end of the algorithm?
Computers And Technology
High School
selecting a counter displays information about that counter's collected data as a chart type. which chart type displays the current value of each performance counter in decimal format?
Computers And Technology
High School
identify the syntax for the option element that contains an attribute to set an option as the default within a selection list.
Computers And Technology
High School
oscar isa digital forensic specialist. he has been given a suspect hard disk thatt has been physically damaged. he wants to try to recover data. what is the first step he should take?
Computers And Technology
High School
what product based on the data over cable service interface specification (docsis) defines the protocols for internet protocol (ip) telephony over hybrid fiber/ coax (hfc) networks?\
Computers And Technology
High School
you are the network administrator for a fortune 500 company. the accounting department has recently purchased a custom application for running financial models. to run properly, the application requires that you make some changes to the computer policy. you decide to deploy the changes through a local group policy setting. you suspect that the policy is not being applied properly because of a conflict somewhere with another local group policy setting. what command should you run to see a list of how the group policies have been applied to the computer and the user?
Computers And Technology
High School
if we have a program of 5000 instructions where each instruction is independent from its previous instruction. assume for this question each state in the pipeline costs 1 cpu cycle, and the cpu runs at a clock speed of 1ghz (1e9 calculations per second). calculate the total time needed to execute this program using the above pipeline architecture. if an instruction takes on average 7 cpu cycles to complete on an architecture with no pipeline, calculate the total time needed with no pipeline, and the speedup we see for this program using the pipelined architecture.
Computers And Technology
High School
a user calls into service desk to ask for assistance locating a specific file. the user is not familiar with their macbook and is unable to locate the missing file from a list of over 700. andy, being the service desk technician, shows the user how to locate the folder. he clicks the search icon on the right side of the file, the menu bar and a search bar are then populate. the user was then able to search for the folder they were looking for. what is the process that andy used to assist in finding the lost folder?
Computers And Technology
High School
in the following code, classes a and b are in the same package, c is in different package. if the question marks in (a) are replaced by blanks, can class b be compiled? if the question marks are replaced by private, can class b be compiled? if the question marks are replaced by protected, can class b be compiled? if the question marks in (a) are replaced by blanks, can class c be compiled? if the question marks are replaced by private, can class c be compiled? if the question marks are replaced by protected, can class c be compiled?
Computers And Technology
High School
1. in an array declaration, this indicates the number of elements that the array will have. a. subscript b. size declarator c. element sum d. reference variable 484 chapter 7 arrays and the arraylist class 2. each element of an array is accessed by a number known as a(n) . a. subscript b. size declarator c. address d. specifier 3. the first subscript in an array is always . a. 1 b. 0 c. 21 d. 1 less than the number of elements 4. the last subscript in an array is always . a. 100 b. 0 c. 21 d. 1 less than the number of elements
Computers And Technology
High School
in file systems consistent with unix semantics: a. users cannot share the pointer of current location into a file. b. writes to a file by a user are immediately visible to other users that have this file open. c. writes performed by one user are not seen by other users . d. a file cannot be opened by one user only.
Computers And Technology
High School
which of the following statements about api documentation are true? group of answer choices api documentation has supplanted inline commenting as the primary form of source code documentation. api documentation tools are not widely available for many popular programming languages. api documentation clarifies the choice of implementing data structures and algorithms for a class. api documentation is largely unnecessary if the code has been designed to be self-documentating. api documentation focuses on how software is used rather than on how it works.
Computers And Technology
High School
what is a collision in a hash table? what is a collision in a hash table? two different keys hashing to a value outside of the range of the table. two different keys being normalized into the hash table at the same index. all keys added to the table without any collisions. a hash function that returns a hash value that does not need to be normalized into the table. a hash table that is completely full. a hash table that does not have any primary clustering. a hash function that yields a uniform distribution in its hash results before normalization.
Computers And Technology
High School
you decide to install windows deployment services (wds). you are using a windows server 2019 domain and have verified that your network meets the requirements for using wds. you need to configure the wds server. what command-line utility can you use to achieve this task?
Computers And Technology
High School
you have an azure storage account named storage1 that contains a file share named share1. you also have an on-premises active directory domain that contains a user named user1. you need to ensure that user1 can access share1 by using the smb protocol. what should you do?
« Previous
Page 35
Next »