EduEase
Home
Register
Login
Master Computers and Technology with Fun Quizzes & Brain Teasers!
Computers And Technology
High School
Which type of IDPS technique includes agents that often include a host-based firewall that can restrict incoming and outgoing traffic for each application on the system, preventing unauthorized access and acceptable use policy violations (e.g., use of inappropriate external services)
Computers And Technology
High School
Practically all of today's computers are equipped with complete _________ capabilities, which means that they can input and output sound, music, images, and video.
Computers And Technology
High School
The __________ method returns a copy of the calling String object with all leading and trailing whitespace characters deleted.
Computers And Technology
High School
Write a C program to define a class called Student with data members as roll, name and marks. Define the appropriate member functions, 1)setdata 2)display for reading and displaying the data and also define a member function called sort to sort 5 students records according to roll, name
Computers And Technology
High School
If you are creating a function that accepts an argument (actual parameter) from the function call which the function should not change, then the corresponding formal parameter (in the function heading) should be ____________________
Computers And Technology
High School
Write a class for parking meters that has the following specification. class ParkingMeter { final int maxTime; float rate; int time; public ParkingMeter(int maxTime, int rate); public void addQuarter()
Computers And Technology
High School
Given an architecture with a clock speed of 500 MHz. Assume an average instruction requires 2 clock cycles. what is the speed expressed in MIPS (Million Instructions Per Second)
Computers And Technology
High School
A fundamental problem/security concern with Public Key (Asymmetric Key) based systems is verifying the association between an entity and that entity's Public Key. This problem is addressed by: A fundamental problem/security concern with Public Key (Asymmetric Key) based systems is verifying the association between an entity and that entity's Public Key. This problem is addressed by: Digital Certificates Signature Verification Nonrepudiation Zero-knowledge proof
Computers And Technology
High School
What 'two word' phrase is missing from the following macro? Sub Test() Sheets("Sheet1").Select Range("A1").Select For k = 1 To 5 ActiveCell.Offset(1, 0).Range("A1").Select Sheets("Sheet1").Select ActiveCell.Offset(5, 0).Range("A1").Select Range(Selection, Selection.End(xlToRight)).Select Selection.Copy Sheets("Sheet2").Select ActiveSheet.Paste Application.CutCopyMode = False End Sub Group of answer choices
Computers And Technology
High School
This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU. This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU. Data access Data compression Disk caching RAID
Computers And Technology
High School
Due to its expanded storage capability, fast access speed, and high reliability, ________ is (are) often used by Internet servers and large organizations.
Computers And Technology
High School
how many computer repair troubleshooters should be on duty from 6:00 p.m. to 10:00 p.m. if total demand during that period is 100 calls
Computers And Technology
High School
A _____ _____ _____ is an attack that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units, memory, bandwidth, and disk space.
Computers And Technology
High School
When comparing on-premises, IaaS, PaaS, and managed services, which option requires the least amount of work for the user in terms of security
Computers And Technology
High School
h file that is opened in Linux is assigned a file descriptor that keeps track of the file when it is open. It is possible, on a very busy server where a great many files may be opened simultaneously, that the descriptors could all be consumed. What common storage issue do
Computers And Technology
High School
One beneficial property of connectionist networks is graceful degradation, which refers to the property that ______________.
Computers And Technology
High School
Separate feeders are to be run from the main service equipment to each of the areas of the commercial building. Each feeder will terminate in a ____, which generally will be installed in the area to be served.
Computers And Technology
High School
Consider a 2-way set associative cache that has 32 blocks and 16 bytes per block. Assume a 32 bit address. Required:How many bits are needed to store the tag in the cache?
Computers And Technology
High School
An attacker captures packets as they travel from one host to another with the intent of altering the contents of the packets. Which type of attack is being executed
Computers And Technology
High School
The proper placement of windows or lighting to observe intruders as well as regular users is an example of:
Computers And Technology
High School
_____ is the unused space in a cluster between the end of an active file and the end of the cluster.
Computers And Technology
High School
Alice prepares a message for Bob and wants Bob to be assured that the message really is from Alice. Briefly explain how an X.509 certificate will enable this process.
Computers And Technology
High School
When declaring a method (i.e. creating the method), what should you do to indicate that the method doesn't return anything
Computers And Technology
High School
If the NOT NULL and UNIQUE specifications are not supported when using a command sequence, use _____ without the specifications.
« Previous
Page 85
Next »