EduEase
Home
Register
Login
Master Computers and Technology with Fun Quizzes & Brain Teasers!
Computers And Technology
High School
__ controls address personnel security, physical security, and the protection of production inputs and outputs.
Computers And Technology
High School
To create a worksheet Group of adjacent worksheets, click on the first tab, hold the ______ key and click on the last tab.
Computers And Technology
High School
To create a reusable workbook with predefine formatting, text, formulas and macros, you would create a:
Computers And Technology
High School
12. Which information attribute is often of great value for networking equipment when the Dynamic Host Configuration Protocol (DHCP) is not used?
Computers And Technology
High School
Suppose four cars each approach an intersection from four different directions simultaneously. Each corner of the intersection has a stop sign. Assume that traffic regulations require that when two cars approach adjacent stop signs at the same time, the car on the left must yield to the car on the right. Thus, as four cars each drive up to their individual stop signs, each waits (indefinitely) for the car on the left to proceed. Is this anomaly a communication deadlock
Computers And Technology
High School
was certain his computer program for grading classes was the best system to use. When others tried to offer feedback, he did not really listen. He is displaying ______ bias.
Computers And Technology
High School
Adele wants to extract a list of unique items in a database. Which of the following will she select in the series of clicks to do so: Select cell > Data tab > Advanced > Select option under Action (X) > Specify List range > Select a starting cell for copying to location > Check box beside Unique records only > OK
Computers And Technology
High School
Write a program DivNumber. A number x is divisible by y if the remainder after the division is zero. Write a Java console application that tests whether one number is divisible by another number. Read both numbers from the keyboard and output whether (or not) the first number is divisible by the second.
Computers And Technology
High School
You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them.What is the most likely cause of the problem?A. Bad printer memoryB. Wrong print driverC. A problem with the printer power supply or the power cable
Computers And Technology
High School
If myNum is initially 0, what is myNum's value after the following? if (myNum ~= 0) myNum = 10; end myNum = myNum + 2;
Computers And Technology
High School
One of the potential problems is _____, in which a single operator symbol has more than one meaning. Although this is often useful, it can lead to reduced readability if users are allowed to create their own overloading and do not do it sensibly
Computers And Technology
High School
A common programming operation is to swap or exchange the values of two vari- ables. If the value of x is currently 19 and the value of y is 42, swapping them will make x into 42 and y into 19. Write a program named swap.py that allows the user to enter two int values. The program should store those values into variables and then swap the variables. Print the values of both variables before and after the swap. You will receive full credit as long as your solution works, but try to do this using as few variables as possible.
Computers And Technology
High School
If the analyst is able to get the source system to insert into the system a message chosen by the analyst, a _________ attack is possible.
Computers And Technology
High School
Complete the equation for the Computer Security Operational Model: Protection = _______ + (Detection + Response)
Computers And Technology
High School
Write a program that generates mazes of arbitrary size using the union-find algorithm. A simple algorithm to generate the maze is to start by creating an N x M grid of cells separated by walls on all sides, except for entrance and exit. Then continually choose a wall randomly, and knock it down if the cells are not already connected to each other. If we repeat the process until the starting and ending cells are connected, we have a maze. It is better to continue knocking down the walls until every cell is reachable from every cell as this would generate more false leads in the maze.
Computers And Technology
High School
When a process is not running, the processor status information is stored in the _________ context area.
Computers And Technology
High School
If a DBMS enforces a DELETE RESTRICT option on the referential integrity constraint between SELLER and REALTOR in the HOMETOWN REALESTATE database, what will be the outcome after a user tries to delete the first record (R1, Claire) from REALTOR?
Computers And Technology
High School
The kernel of modern OS is responsible for A. interleaving multiple processes in and out of execution. B. providing facilities to help prevent deadlock on shared resources. C. implementing a two-way set associative cache or a direct mapped cache. D. providing facilities for interprocess communication. check
Computers And Technology
High School
Authentication between manager and agent in a management session belongs to: Question 12 options: Communication viewpoint; Function viewpoint; Information viewpoint; None of the above;
Computers And Technology
High School
Consider a client and a Web server directly connected by one link of rate R. Suppose the client wants to retrieve an object whose size is exactly equal to 15 S, where S is the maximum segment size (MSS). Denote the round-trip time between client and server as RTT (assumed to be constant).
Computers And Technology
High School
A(n) _______ field stores a numerical value with a high degree of accuracy (up to four decimal places to the right of the decimal). Access will not round these fields.
Computers And Technology
High School
A type of twisted-pair copper cable used for connecting workstations to network devices is known as: (Select 2 answers)
Computers And Technology
High School
Suppose a program can find the largest number in a list of 3 numbers. What is the most direct abstraction of this program
Computers And Technology
High School
The ________ command produces multiple named ranges at one time from the headings in rows, columns, or both from the data set.
« Previous
Page 99
Next »