EduEase
Home
Register
Login
Master Computers and Technology with Fun Quizzes & Brain Teasers!
Computers And Technology
High School
A(n) _________ is an interactive website kept constantly updated and relevant to the needs of its customers using a database.
Computers And Technology
High School
In UNIX, the return value for the fork system call is _____ for the child process and _____ for the parent process. This assumes the fork() was successful.
Computers And Technology
High School
Write a program that, given two binary numbers represented as strings, prints their sum in binary. The binary strings are comma separated, two per line. The final answer should not have any leading zeroes. In case the answer is zero, just print one zero i.e. 0
Computers And Technology
High School
Suppose we use a checksum scheme based on the addition of successive 8-bit fields rather than 16-bit fields as in the Internet Transport layer. Now suppose that the following 3 bytes are received, in which the last byte is the checksum field. 0 1 0 1 0 01 1 1 1 0 1 0 1 0 0 1 1 0 1 0 1 1 1 Does the receiver detect an error that might have occurred during the transmission of these three bytes
Computers And Technology
High School
Which transformation in computing allows for storage and delivery of applications and data over the internet
Computers And Technology
High School
In a(n) public-key system, the __________ for messages to go to a particular receiver is broadcast to everyone, but the decryption key cannot be derived from it and is known only by the receiver.
Computers And Technology
High School
________ traffic can adjust, over wide ranges, to changes in delay and throughput across an internet and still meet the needs of its applications.
Computers And Technology
High School
Consider the following code segment. if (false && true || false) { if (false || true && false) { System.out.print("First"); } else { System.out.print("Second"); } } if (true || true && false) { System.out.print("Third"); } What is printed as a result of executing the code segment?
Computers And Technology
High School
In the lab, you created a text file to schedule a daily backup. This type of file is called a __________.
Computers And Technology
High School
which device is used to allow a usb device to charge but blocks the data transfer capabilities of the device
Computers And Technology
High School
Abrasive cleaners are to be used with caution because they Question 11 options: All of the above Deactivate sanitizing solutions Are expensive Can scratch surfaces
Computers And Technology
High School
Which prompt is displayed when a network administrator successfully accesses the boot loader on a switch to recover from a system crash
Computers And Technology
High School
Which form of authentication allows both Windows authentication and SQL Server authentication to obtain access to the database
Computers And Technology
High School
A(n) ____________________ is a search for a way in which a current problem is similar to other problems that have been previously solved.
Computers And Technology
High School
Explain how computational manipulations of information require consideration of (1) representation, (2) storage, (3) security, and (4) transmission
Computers And Technology
High School
ssume that the boolean variables a and b have been declared and initialized. Consider the following expression. (a && (b || !a)) == a && b Which of the following best describes the conditions under which the expression will evaluate to true? Only when a is true Only when a is true Only when b is true Only when b is true Only when both a and b are true Only when both a and b are true
Computers And Technology
High School
If a derived class introduces additional methods, properties, or fields, a base class reference variable cannot access them t/f
Computers And Technology
High School
Given a first string on one line and a second string on a second line, append the second string to the first string and then output the result. Ex: If the input is: Fuzzy bear !!! the output is: Fuzzy bear!!! Note: Using a pre-defined string function, the solution can be just one line of code.
Computers And Technology
High School
Write a complete C++ program that does the following. (Programs that correctly carry out some of the tasks will receive partial credit.) a. It asks the user to enter a positive integer. b. The program reads a value n entered by the user. If the value is not legal, the program terminates. c. The program prints a table with n lines of output. On output line number x the program should list the numbers from 1 to x together with their sum.
Computers And Technology
High School
Create a Scanner object to collect user input Create a variable called menuSelection to keep track of the user's current menu choice Create a loop that contains a menu with numbered options. You should have at least 3 conversion options and one quit option. An example menu: Please select an option: 1. Cups to Teaspoons 2. Miles to Kilometers 3. US Gallons to Imperial Gallons 4. Quit
Computers And Technology
High School
What differentiates a terminal value from a(n) ______ value is the difference between means and ends.
Computers And Technology
High School
There are several types of malicious code attacks that a hacker can use to gain entry into or compromise a computer system. In this type of malicious code attack, self-replicating programs are installed, copied, and spread them to other machines:_____.
Computers And Technology
High School
_____ uses systems communicating with specific devices within a defined space like inside or around the perimeter of a retail unit or signage.
Computers And Technology
High School
Why would Claire, who has a Certified Information Systems Security Professional credential, object to shadow IT efforts at her company
« Previous
Page 94
Next »