Questions LLC
Login
or
Sign Up
Ask a New Question
Computer Science and Technology
Page 2
Questions (111)
Provide MCQ and True/False questions related to Operation System
3 answers
asked anonymously
19 views
True Or False:
Network Architectures are cohesive layers of protocols defining a set of communication services.
2 answers
asked by
Shah
518 views
· Write a 200- to 350-word paper that describes the distinctions of data and information and briefly explains the process a
2 answers
asked by
Tracy
573 views
what is the difference between programming and planning
3 answers
asked by
Samuel Gudeta
46 views
Generate an object-oriented design for a system that keeps tracks of your CD and DVD collection.
· Identify each of the classes,
1 answer
asked by
Joe
637 views
i need this decrypted if anyone can help that would be great
1b4a045c34a0573ca57657a1021dc171
1 answer
asked by
David
225 views
distinguish between computer data represented by the state of a computer's electrical switches and the meaningful information
1 answer
asked by
Cajunkay
365 views
describe and compare the three basic ways in which software designers enable users to enter commands into the computer?
1 answer
asked by
john
351 views
A computer company produces hardware and software using the same facility. (i.e., with the same L and K). The total cost of
2 answers
asked by
Salman
528 views
"Quisiera ser técnico de computadoras en el futuro." "Sí, pero ______ necesario estudair en la universidad por muchos años."
a
1 answer
asked by
y912
463 views
The primary oscillator frequency on explorer 16 is 14.535 MHZ. PLL is used. What is the instruction cycle frequency (Fcy)?
Fosc
3 answers
asked anonymously
60 views
indentify 3 aspects of a good HCI
1 answer
asked by
arron
351 views
Dash is a set of instructions given to the computer.
3 answers
asked anonymously
70 views
What is a collision in a hash function? (2 points)
• 2 inputs map to the same output O There are few inputs, but a lot of
3 answers
asked anonymously
53 views
In order to decrypt an encrypted message, pass the encrypted message and the _ to the decrypt function.
• key • cipertext •
3 answers
asked anonymously
43 views
Cryptography is defined as:
A. The practice of encoding information so only authorized people can read it. B. Verified authority
3 answers
asked anonymously
48 views
What is a collision in a hash function?(2 points)
Responses 2 inputs map to the same output 2 outputs come from the same input
3 answers
asked anonymously
82 views
Utility program is also called
3 answers
asked by
Lakshmi oberoi
19 views
List four examples of applications software
3 answers
asked by
Lakshmi oberoi
26 views
How do you determine which field(s) to select as the primary key?
1 answer
asked by
John
446 views
what word has this vocabulary???
displays information in rows and columns it ends with an e but i don't know the word
3 answers
asked by
bryan
541 views
Once you defragment a computer, do you lose files in your history or bookmarks or anywhere?
If that's true, is there any way to
2 answers
asked by
brie
545 views
Are hackers ethically wrong?
What should we do about hackers? I think we should protect ourselves from hackers. What do you
1 answer
asked by
Gurv
383 views
Objective:
Imagine you're a software developer at a space agency, and they are about to launch a spacecraft. Before the launch,
1 answer
asked anonymously
158 views
Ahmad is choosing a password to access his teacher’s web page. He must choose a capital letter and three nonrepeating digits
7 answers
asked by
bla
3,416 views
Why is it important to recognize the proper boundaries or limits of algorithms?(1 point)Responsesbecause otherwise the algorithm
1 answer
asked anonymously
69 views
The most commonly used code for pipelines is ____________________.
1 answer
asked anonymously
29 views
Explain how index Scan can execute query
1 answer
asked anonymously
38 views
External sorting
Sort strategy Merge strategy With some example
1 answer
asked anonymously
84 views
consider a two server system which a customer is served first by server 1, then by server 2 and then departs. the server times
1 answer
asked by
skl
625 views
Why is primary memory faster than secondary memory?
(1 point) • primary memory has a faster clock speed • primary memory is
1 answer
asked anonymously
65 views
If an algorithm behaves differently for adults and children, which symbol should be used?(1 point) Responses process process
1 answer
asked by
hatemaths
73 views
What is the purpose of the AutoSum feature in Microsoft® Excel? (1 point) Responses to automatically add all numbers in all
1 answer
asked by
Hecker-_-
86 views
____________ occurs when a server hits two faults in a row.
4 answers
asked anonymously
110 views
Discuss the three techniques used for mapping blocks of memory into cache line
1 answer
asked by
Asselly
30 views
In 1-2 sentences, write out the 6 basic different phases of the software development life cycle (SDLC) and a roadmap for
1 answer
asked by
hatemaths
106 views
What is the bit representation of the word cat?(1 point) Responses 01000011 01000001 01010100 01000011 01000001 01010100
1 answer
asked anonymously
31 views
A user enters their phone number in a form where their name should go. Which kind of error is most likely to occur?
Division by
1 answer
asked anonymously
45 views
3 differences between multiprocessor and multcomputer
1 answer
asked by
Asselly
13 views
Bit Representation Quick Check
4 of 54 of 5 Items Question Suppose you describe the process of getting the bit representation of
1 answer
asked anonymously
60 views
Which statement best describes the difference between a spreadsheet and a database? (1 point) Responses Spreadsheets store data
1 answer
asked by
kojejcciewhoiel
25 views
Which of the following could be described as processing and the output of processing?(2 points) Responses After counting the
1 answer
asked anonymously
13 views
To sort items in alphabetical order. What should you select from the field name drop down menu
1 answer
asked by
...
22 views
Which of the following is a group of elements or types that stores and organizes data so it can be used efficiently?(1 point)
1 answer
asked by
hatemaths
32 views
Question 20 to 24.
20. A trackball is an example of the common computer a) Input devices b) Output devices c)Processing devices
1 answer
asked by
Abdulrazak umar Usman
50 views
Question 20 to 21
20. A trackball is an example of the common computer a) Input devices b) Output devices devices c) Processing
1 answer
asked by
Abdulrazak umar Usman
29 views
1. a. Copy and complete the following table of difference between FTP and TFTP
S.N. Parameter FTP TFTP Operation Authentication
1 answer
asked by
Abdulrazak umar Usman
28 views
students a using a game engine to develop their games in a class at school. After they have completed their game they decide
1 answer
asked anonymously
27 views
Spreadsheet titles are important because
Group of answer choices A. if there is no title the spreadsheet is not valid B. if the
1 answer
asked by
yES
23 views
Cascading Style Sheet (CSS) is most similar to:
(1 point) Responses brains. brains. muscles. muscles. skin. skin. bones.
1 answer
asked by
Hailee
36 views
Pages
1
2
3
Parent Categories (1)
Career Paths