Search
Questions in computers-and-technology
[Free] Microsoft Word provides you many templates to create your document. True False
[Free] Which one of the following is not true about computers? a) It works very fast b) It never gets tired c) It can think
[Free] What is a characteristic shared by all devices that can be infected by a computer virus? Multiple Choice A. They are laptops and desktop computers. B. They are PC-based. C. They are connected to the Internet. D. They are all relatively old devices.
[Free] A. Answer the following questions in one line: 1. Write the steps to display the hidden files or folders. 2. What do you understand by personal folder? 3. What is the use of Bullets and Numbering? 4. What is formatting? 5. What is PowerPoint? B. Fill in the blanks: 1. __________ Simple displays all the folder contents and the sub folders within that folder. 2. Add or Remove Programs is present in __________ option. 3. In formatting we can change __________ and __________ size. 4. __________ is used to make the start of each item in a list. 5. MS-PowerPoint is a member of __________
[Free] Match each al refreshVariable configuration to the appropriate refresh behavior. Note: Each refresh behavior will be used once, more than once, or not at all. Configurations: - refreshAlways: true - refreshOnReferencedVarChange: true Refresh behaviors: - Refresh each time the value of any variable it references within the value parameter is updated - Refresh when a specific variable changes - Refresh on a timer - Refresh after every user interaction - Refresh when any referenced variable changes
[Free] A company is looking for an employee to help organize customer information for the sales team. Which computer field includes this job? A. Security analysis B. Systems analysis C. Network support D. Database support
[Free] Explain each step on how you would install the Data Analysis tool in Microsoft Excel, and take a screenshot showing that it is installed on your PC for smooth utilization in this course.
[Free] A forensic investigator enters the digital crime scene at a bank and performs the following procedures. One or more of the procedures is incorrect. Can you identify which ones? 1. Secure the device to make sure radio frequencies are blocked. 2. Prevent all unauthorized personnel from entering the area. 3. Check to make sure no commands have been executed to delete data. 4. Get help from a bank official, if offered, to help with the command checks. 5. Document all who had access to the computer. 6. Pack the computer in plastic to prevent it from getting wet during transport. 7. Make a copy of the hard drive and work from the copy rather than the original. Select one: A. 4 and 6 B. 6 and 7 C. 6 only D. 7 only E. 4 and 7
[Free] Which of the following types of attack signatures can be detected only after analyzing a series of packets over a long time? A. Context-based signature B. Composite signature C. Content-based signature D. Atomic signature
[Free] In Polkadot, XCM denotes: A) A built-in DeFi token swap module on Polkadot. B) A cross-consensus messaging format for parachain communication. C) Ethereum's sharding interoperability standard proposal. D) A method for submitting on-chain governance referenda.
« Prev
1
...
88
89
90
91
92
...
106
Next »