EduEase
Home
Register
Login
Master Computers and Technology with Fun Quizzes & Brain Teasers!
Computers And Technology
High School
Please please please help I beg I'll give brainiest. :( A digital egg timer uses an input, process and output. (a) Suggest an appropriate input component. (b) Suggest an appropriate output component (c) Circle the most appropriate device below to be used for the timing process. Monostable or Astable
Computers And Technology
College
Suppose the count function for a string didnt exist. Define a function that returns the number of non-overlapping occurrences of a substring in a string.
Computers And Technology
High School
Read the following code used to calculate the total cost of an item with tax: price = input("What is the item price? ") tax = price * 0.065 totalPrice = price + tax There is an error in the code. What type of function needs to be used? (5 points) float() int() print() str()
Computers And Technology
College
Which data type would you ascribe to a pointer? (unsigned) real (unsigned) integer boolean No answer text provided.
Computers And Technology
College
When you are creating a certificate, which process does the certificate authority use to guarantee the authenticity of the certificate
Computers And Technology
College
Write a JavaScript to multiple 2 square matrices (3,3). You can use any numbers as elements of the matrix.
Computers And Technology
Middle School
Consider the following algorithm:Step 1: Start with a list of the positive integers from 2 to 100, inclusive (meaning you include 2 and 100 in your list).Step 2: For each $n$ from 2 to 50, inclusive, do the following: Remove all multiples of $n$ greater than $n$ from the list.Step 3: Output all of the numbers remaining in the list.What is the tenth number in the list that gets output?
Computers And Technology
College
The attack in which the attacker sends a fragmented message that the victim cannot reconstruct is a(n) ________ attack.
Computers And Technology
College
What are the differences between editing manually and editing digitally? What tools are used for each?
Computers And Technology
College
g If a class named Student has a data member named gpa , and one of its member functions has a parameter also named gpa , how can you refer to the data member inside that member function
Computers And Technology
College
"Players The files SomePlayers.txt initially contains the names of 30 football play- ers. Write a program that deletes those players from the file whose names do not begin with a vowel."
Computers And Technology
College
In total, how many 8-bit registers are there in the Intel 80x86 CPU design presented in class? Name one of these 8-bit registers.
Computers And Technology
College
Create a page using PHP for a business website that will ask the user to enter his or her name into text boxes and will display a welcome message that uses the users name.
Computers And Technology
College
ZigBee is an 802.15.4 specification intended to be simpler to implement, and to operate at lower data rates over unlicensed frequency bands.a. Trueb. False
Computers And Technology
College
Write a program that asks a user to predict how many rolls of a single die it will take to reach 100. When all rolling is finished, compare the given answer to the results and let them know if they did well or not.
Computers And Technology
College
If you need speeds of 16 Mbps between two corporate sites in the United States, you would need a ________ leased line. T1 T3 OC3 None of these
Computers And Technology
College
Write a program in python that ask the user to enter a word and then capitalizes every other letter of that word
Computers And Technology
Middle School
What types of information are commonly included in headers and footers? Check all that apply.I datepage numberstablesnumber of pagesfile path and file nameprinter namesheet nametime
Computers And Technology
Middle School
Which of the following describe a requiredargument? Check all that apply.an argument that does not need to bespecifiedan argument defined by its parameter namean argument passed to the function in thecorrect positional orderan argument wherein the number ofarguments in the function call should matchthe definition of the functionDONE
Computers And Technology
College
Consider a situation where we have a file shared between many people. If one of the people tries editing the file, no other person should be reading or writing at the same time, otherwise changes will not be visible to him/her. However if some person is reading the file, then others may read it at the same time. Precisely in OS we call this situation as the readers-writers problem Problem parameters: One set of data is shared among a number of processes Once a writer is ready, it performs its write. Only one writer may write at a time If a process is writing, no other process can read it If at least one reader is reading, no other process can write Readers may not write and only read
Computers And Technology
High School
2. In many jurisdictions a small deposit is added to containers to encourage people to recycle them. In one particular jurisdiction, containers holding one litre or less have a $0.10 deposit, and containers holding more than one litre have a $0.25 deposit. Write a Python script that reads the number of containers of each size from the user. The script should compute and display the refund that will be received for returning those containers. Format the output so that it includes a dollar sign and displays exactly two decimal places.
Computers And Technology
College
What's the value of this Python expression? ((10 >= 5*2) and (10
Computers And Technology
College
What's the value of this Python expression? ((10 >= 5*2) and (10
Computers And Technology
College
The mobile nodes (devices) add or leave a Mobile Ad-hoc Network, changing the _____ of this network over time. a) infrastructure b) topology c) transmission range d) transmission speed
« Previous
Page 70
Next »