Study Savvy
Home
Register
Login
Ultimate Computers and Technology Study Guide - Questions & Answers
Computers And Technology
High School
marilee needs to check the company's customer database to view all of the customers who are located in florida. what query filter should marilee use to retrieve the desired results quickly
Computers And Technology
High School
assume a stack-oriented processor that includes the stack operations push and pop. arithmetic operations automatically involve the top one or two stack elements. begin with an empty stack and consider the following program push 4 push 7 push 8 add push 10 sub mul push 40 push 4 div add a) show the resulting stack after each operation is performed. b) write an expression using normal infix notation that is equal to the calculation just performed using this stack machine.
Computers And Technology
High School
cassie is an it help desk representative. she just received a trouble ticket from a remote user stating they cannot connect to the company network over the virtual private network (vpn). cassie begins troubleshooting the matter, checking on recent configuration changes to the vpn equipment, looking at the unit's logs for error messages, and so on. she has examined the vpn-related features and potential problems but still doesn't understand why the end user's connection failed. she has been assured that both the end user and the company have internet connectivity. what is the most likely reason the user cannot connect?
Computers And Technology
High School
sara receives a call from a customer who just purchased their first computer with windows 10 installed. they are having some issues using the new computer and need help setting up a printer. what should sara do when working with the inexperienced customer? (select all that apply.)
Computers And Technology
High School
what is the java virtual machine? group of answer choices a program that simulates a real cpu running compiled java code. a cpu that runs compiled java code. a library that makes it possible to write portable programs. a program that translates java code into machine instructions.
Computers And Technology
High School
write a function that will accept a complex number c, and plot at point on a cartesian coordinate system with a circular marker. the plot should include both the x and y axes, plus a vector drawn from the origin to the location of c. include a test script and the input and output.
Computers And Technology
High School
shamika is a networking student who has just moved into a small house with two other roommates. she has purchased a new dsl modem and is planning on configuring the built-in firewall. she needs to change the default username and password for the device first. what is her concern?
Computers And Technology
College
Hardware and software that attempt to emulate the processing patterns of the biological brain best describea. a neural network.b. fuzzy logic.c. case-based reasoning.d. an expert system.e. artificial intelligence.
Computers And Technology
High School
you are given a 2mb direct mapped chache that has 512 b lines. the system has 32 bit addresses, with bits numbered from 0 to 31. what bit ranges are associated with each of the offset, index, and tag frields of an address?
Computers And Technology
College
The Python "SyntaxError: leading zeros in decimal integer literals are not permitted" occurs when we declare an integer with leading zeros. To solve the error, remove any leading zeros from the integer or wrap the value in a string.
Computers And Technology
College
What characteristics of program memory accesses do caches exploit?a) Spatial Localityb) Temporal Localityc) Continual Localityd) Both a and be) Both b and c
Computers And Technology
College
Which of the following statements prints the value of the variable x if it is divisible by both 3 and 57
Computers And Technology
College
Which of the following physical security controls provide protection against laptop theft? (Select 2 answers)A. EncryptionB. Cable LockC. LoJack for laptopsD. Smart card readerE. Laptop lock
Computers And Technology
College
A greedy algorithm can be used to solve all the dynamic programming problems.A.trueB.false
Computers And Technology
High School
this content may violate our content policy. if you believe this to be in error, please submit your feedback your input will aid our research in this area.
Computers And Technology
College
How does geography keep people in the United States from having Internet access? Name two areas of the United States affected by digital exclusion.
Computers And Technology
High School
a group of 4 bits can be used to encode up to 16 different items, it follows that a group of 8 bits can encode up to how many items?
Computers And Technology
High School
checking to determine whether the proper screener questions were invoked would be part of which step in the data analysis procedure?
Computers And Technology
High School
which network device is designed to block network connections that are identified as potentially malicious?
Computers And Technology
High School
the address resolution protocol (arp) transmits a broadcast message and requests a reply with information on the ip address of a computer. arp most likely offers a
Computers And Technology
High School
you need to limit the impact of a security breach for a particular file server with sensitive company data. which strategy would you employ? answer containment segmentation isolation soar
Computers And Technology
High School
a user on the phone does not seem to be able to explain their problem to you without using profanity. that profanity is making you unable to understand their problem. what should you do?
Computers And Technology
High School
create a function that calculates the sum of integers from 1 to the argument taken by the function, inclusive. call the function inside a print statement to test.
Computers And Technology
High School
which of the following are examples of attacks? select all that apply. a lightning strike knocks out the power to the main processing center of a financial institution. an unofficial policy in a company that allows friends of employees to enter facilities without signing in or being formally escorted. someone sits outside a company's headquarters and jams their guest wifi signal. a contractor visiting a client site attempts to brute force a login to the administrator account, but is not able to able to gain access.
« Previous
Page 36
Next »