Search
Questions in computers-and-technology
[Homework Help] The computer education teacher at the elementary school loves the new technology that is being brought into classrooms. She believes that it can help improve a student's education and performance. These teachers are A) Luddites B) Late adopters C) Neo-luddites D) Technophiles
[Homework Help] A ______ allows multiple connections to a single signal. Without a ______, connecting to the Internet would not be possible. A ______ connects one or more networks and handles network traffic.
[Homework Help] Look at the spreadsheet below, then answer the question that follows. | | A | B | C | D | |---|----------|--------------|-----------|----------| | 1 | | Card number | Books out | Overdue? | | 2 | Patron 1 | 457845904675 | 3 | Yes | | 3 | Patron 2 | 109846205634 | 2 | No | | 4 | Patron 3 | 124978546302 | 7 | Yes | Which of the following was most likely used to apply red background and font to some of the cells in column D? A. cell attribution B. subtotal calculation C. VLOOKUP functions D. conditional formatting
[Homework Help] Traditionally, have the magnetic particles on a hard disk been aligned vertically, perpendicular to the hard disk's surface? True False
[Homework Help] Describe some barriers to implementing technologies in early childhood education. How could these be overcome?
[Homework Help] There are two parts to any storage system: the storage processor and the storage device. True or False?
[Homework Help] In terms of functionality, the distinction between NAS and HHD is blurring because they both provide storage services to the network. True or False?
[Homework Help] The most common internal hard drive interface standard for desktop computers today is serial ATA. True or False?
[Homework Help] Is an electronic device that manipulates information or data and has an ability to store, retrieve, and process data? A. Address bus B. Transistor C. Control bus D. Computer
[Homework Help] Why is a sniffer set to promiscuous mode so difficult to detect? A. No suspicious activity occurs. B. They are undetectable with a ping request. C. They do not transmit data. D. They allow traffic to pass without validating the destination.
« Prev
1
...
68
69
70
71
72
...
106
Next »