Askhoma
Home
Search
Register
Login
Search
Computers and Technology
Computers And Technology
College
A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also be system objects such as shared memory or a linked list data structure. This principle is based in object-oriented programming (OOP). In OOP, a class definition encapsulates all data and functions to operate on the data. The only way to access a resource is through the provided interface. Which security principle are we referring to
Computers And Technology
College
Please draw the dynamic array stack structure (you must mention the size and capacity at each step) after the following lines of code are executed. You should assume that the initial capacity is 2 and a resize doubles the capacity.values = Stack()for i in range( 16 ) :if i % 3 == 0 :values.push( i )else if i % 4 == 0 :values.pop()
Computers And Technology
College
Give three reasons to use a hard drive as mass storage.
Computers And Technology
High School
Tests of controls in an advanced computer system Can be performed using actual transactions or simulated transactions. Can be performed using only actual transactions because testing of simulated transactions is of no consequence. Is inadvisable because they may distort the evidence in master files. Is impracticable because many procedures within the computer processing activity leave no visible evidence of having been performed.
Computers And Technology
College
a. Download the attached Greetings.java file.b. Implement the getGreetings method, so that the code prompts the user to enter the first name, the last name, and year of birth, then it returns a greetings message in proper format (see the example below). The main method will then print it out. Here is an example dialogue with the user:Please enter your first name: tomPlease enter your last name: cruisePlease enter your year of birth: 1962Greetings, T. Cruise! You are about 50 years old.Note that the greetings message need to be in the exact format as shown above (for example, use the initial of the first name and the first letter of the last name with capitalization).c. Submit the final Greetings.java file (DO NOT change the file name) online.
Computers And Technology
College
what is programming language?
Computers And Technology
College
Help PlsI need about 5 advantages of E-learning
Computers And Technology
College
Which option is used in order to configure switchboards for a complex database?Switchboard ManagerGlobal OptionsQuick SearchDatabase Formatterworth 100 points
Computers And Technology
College
Programming languages categorize data into different types. Identify the characteristics that match each of the following data types. a. Can store fractions and numbers with decimal positionsb. Is limited to values that are either true or false (represented internally as one and zero). c. Is limited to whole numbers (counting numbers 1, 2, 3, ...)
Computers And Technology
High School
What is the correct name for the words Home, Insert, Design, Layout, References, etc. in the ribbon in Word 2016?groupstabssectionsproperties
Computers And Technology
High School
outline the steps involved in signing into your account
Computers And Technology
College
transmits data wirelessly via infrared (IR) light waves.AsO A. RFIDB. EthernetO C. BluetoothD. IrDAReset Selection
Computers And Technology
High School
can you open a privacy password
Computers And Technology
College
what is the build in libary function to compare two strings?
Computers And Technology
High School
What is the definition of stream cipher? A. Cryptography wherein two keys are used: one to encrypt the message and another to decrypt it B. A cryptographic method in which someone chooses a number by which to shift each letter of a text in the alphabet and substitute the new letter for the letter being encrypted C. A form of cryptography that encrypts the data as a stream, one bit at a time D. A method other than brute force to derive a cryptographic key
Computers And Technology
College
write a programmimg code in c++ for school based grading system, the program should accept the subject in the number of students from a user and store their details in the array of type student(class) the student class you have:1. number student name, index number remarks as variables of type string, marks as integer and grade as char.2. avoid function called getData which is used to get student details 3. avoid function called calculate which will work on the marks and give the corresponding great and remarks as given below on Marks 70-100 grade A remarks excellent Mark 60-69 Grade B remarks very good marks 50-59 grade C remarks pass maths 0-49 grade F remarks fail
Computers And Technology
College
Which Windows installation method requires the use of Windows deployment services (WDS)? 1. Network Installation 2. Repair Installation 3. Bootable flash drive installation 4. Unattended installation
Computers And Technology
High School
How would you approach a friend that you suspect is addicted to technology?
Computers And Technology
Middle School
can someone help me im using python IDLE and im getting this message in the output what does this mean "Error: unindent does not match any outer indentation level"
Computers And Technology
College
How many cost units are spent in the entire process of performing 40 consecutive append operations on an empty array which starts out at capacity 5, assuming that the array will grow by a constant 2 spaces each time a new item is added to an already full dynamic array
Computers And Technology
College
What is the definition of: a computer network? data communications? telecommunications? a local area network? a personal area network? a metropolitan area network a wide area network? network management? convergence? g
Computers And Technology
High School
A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101. What is the decimal value of the host portion of the address?
Computers And Technology
College
An integer is said to be a perfect number if the sum of its divisors, including 1 (but not the number itself), is equal to the number.a. Trueb. False
Computers And Technology
College
The Federal Financial Institutions Examination Council (FFIEC) developed the Cybersecurity Assessment Tool, which can be used as a self-assessment tool for identifying a bank or financial institution's cybersecurity maturity.a. Trueb. False
« Previous
Page 16
Next »