EduEase
Home
Register
Login
Master Computers and Technology with Fun Quizzes & Brain Teasers!
Computers And Technology
High School
Mr. Washington is digitizing old family photos. A 4"x6" photo is digitized using 10,000 pixels. An 11"x7" photo is digitized using 30,000 pixels. Which image will have the better resolution?Mr. Washington is digitizing old family photos. A 4"x6" photo is digitized using 10,000 pixels. An 11"x7" photo is digitized using 30,000 pixels. Which image will have the better resolution?the 11"x7" photothe 4"x"6 photothe photos will have the same resolution
Computers And Technology
High School
A 4"x6" photo is digitized using 10,000 pixels. An 11"x7" photo is digitized using 30,000 pixels. Which image will have the better resolution?the 11"x7" photothe 4"x"6 photothe photos will have the same resolution
Computers And Technology
High School
A database is an organized collection of ________ related data. a. logicallyb. badly c. loosely d. physically
Computers And Technology
High School
The largest social networking site, ________, originally had a focus of connecting friends and family.
Computers And Technology
High School
Which number system is used to store information digitally in a computer? decimal (base 10) binary (base 2) octal (base 8) hexadecimal (base 16)
Computers And Technology
High School
Older systems that often contain data of poor quality are called ________ systems. a. mainframe b. database c. legacy d. controlled
Computers And Technology
High School
Mr. Washington is digitizing old family photos. A 4"x6" photo is digitized using 10,000 pixels. An 11"x7" photo is digitized using 30,000 pixels. Which image will have the better resolution?
Computers And Technology
College
What happens if you have two values with no operator between them
Computers And Technology
High School
A(n) __________ provides all the necessary tools to create, test, and debug software.
Computers And Technology
High School
What are some restrictions that should apply to sensitive and confidential data? check all that apply.
Computers And Technology
High School
You are asked to develop a process that runs in the background and handles network communications. what type of process should you develop?
Computers And Technology
High School
The top-level domain (tld), also known as the ________, typically identifies the type of organization an address is associated with.
Computers And Technology
High School
The ____ is where ongoing communications between a sender and a receiver, somewhat like a telephone conversation, are set up, maintained, and then terminated, or torn down,as needed.
Computers And Technology
High School
Jennifer rodrick uses a computer to help her record her spending each month. she updates her records weekly. this activity would be an example of:
Computers And Technology
High School
Why should you use column labels such as y2019 rather than a number such as 2019 when creating an autosum formula?
Computers And Technology
High School
___________ are mostly used to collect raw data and output meaningful information.
Computers And Technology
High School
An excel workbook file name can contain up to _____ characters and cannot include _____.
Computers And Technology
College
What year was html released?
Computers And Technology
High School
We need to ensure that the private member variables that are inherited from the base class are initialized when a ____ of the derived class executes.
Computers And Technology
High School
What type of backup will make a copy of all files on the computer, including user files and operating system files, to use in the event of a complete failure?
Computers And Technology
High School
You just read an article about an internet worm recently causing problems. what type of software should you install to protect yourself from this worm?
Computers And Technology
High School
Log into a network, you must use a password and answer a security question. what is this an example of?
Computers And Technology
High School
The _________________ creates international guiding principles for computer forensic examiners.
Computers And Technology
High School
The ____ is ultimately responsible for managing all internet domain names, network addresses, and protocol parameters and behaviors.
« Previous
Page 60
Next »