EduAssist
Home
Computers and Technology Quiz & Practice Tests - Test Your Skills
Computers And Technology
High School
write a program that tells what coins to give out for any amount of change from 1 cent to 99 cents. you can use coin denominations of 25 cents, 10 cents, 5 cents, and 1 cent. make sure to use least number of coins.
Computers And Technology
High School
which of these makes an algorithm impractical for use? select one: a. constant time b. quadratic time c. logarithmic time d. linear time e. exponential time
Computers And Technology
College
while performing disk and file maintenance on the company file server, you determine a user in the accounting department has been accidentally saving documents to all shared folders on the file server. the user's computer was recently passed to her from another user in the company, and according to company policy, the user should have access only to the accounting share.
Computers And Technology
High School
you want to copy a formula in a cell down the column into multiple other cells. what would be the best tool for the job?
Computers And Technology
High School
T/F By default margins are set to Narrow Margins.TrueO False
Computers And Technology
High School
a file may be associated with several images at the same time in: a. file systems consistent with unix semantics. b. file systems consistent with windows semantics. c. file systems consistent with session semantics. d. file systems consistent with nfs (network file system) semantics.
Computers And Technology
High School
what is the syntax for the cmd.exe command to view the attributes on a file named batch1.bat in windows 10
Computers And Technology
High School
true or false? a protocol analyzer can see every data link layer frame and network layer protocol in use.
Computers And Technology
High School
the federal government is the largest creator and user of information in the united states. true or false
Computers And Technology
High School
what activity involves simply observing someone's screen or keyboard to get information, often passwords?
Computers And Technology
High School
7.6e write a correlated sql query to retrieve the number and status of all suppliers, except for the three suppliers with the lowest supplier status.
Computers And Technology
High School
please see the attached workbook. which formula is used to provide a link to cell a4 in the same workbook with link text same as text present in a4?
Computers And Technology
High School
how is data transfer between cpu and i/o peripherals different from data transfer between cpu and memory? how does i/o module help in data transfer?
Computers And Technology
High School
you decide to create an r markdown notebook to document your work. what are your reasons for choosing an r markdown notebook? select all that apply.
Computers And Technology
High School
in oracle, if we apply the comparison method used for one of the attributes as the comparison method for the entire type, the method is called a(n):
Computers And Technology
High School
listen to exam instructions corpserv is a small company with 14 client systems and a network printer. because there are only a limited number of network systems, you decide to use apipa addressing. with apipa configured, all the systems are able to communicate with each other, but you're having trouble configuring internet access. what is the most likely cause of the problem?
Computers And Technology
High School
what sql function will combine right and left join to return all matching records in both tables? 1 point inner join right join outer join left join
Computers And Technology
High School
a user is entering a building that has an electronic locking system. the user starts an app on their phone and touches it to the lock console and then enters a pin to gain entry. which credential categories did the user use, and in what order were they used to gain entry?
Computers And Technology
High School
in what situation can we use sequential search? choice 1 of 5:when the array is sorted and the target is in the array. choice 2 of 5:when the array is sorted and the target is not in the array. choice 3 of 5:when the array is not sorted and the target is in the array. choice 4 of 5:when the array is not sorted and the target is not in the array choice 5 of 5:all of the above
Computers And Technology
High School
you are the administrator of a large organization. while setting up your windows server domain controller, you are creating a data recovery strategy that must meet the following requirements: back up all data files and folders in c:\data. restore individual files and folders in c:\data. ensure that data is backed up to and restored from external media. what should you do?
Computers And Technology
High School
the virtual file system layer is dedicated to allow access to: a. different types of locally mounted file systems and remote file systems. b. locally mounted file systems only. c. remote file systems only. d. locally mounted file systems or remote ones, but for one type of file system only.
Computers And Technology
High School
there's a section of analytics that includes cards answering common questions about how users interact with your app or website. which section is it?
Computers And Technology
High School
if mark has a read-write permission to the share \\fileserver\securefiles and a read-only permission to the file coolstuff.docx on the ntfs file system shared by the file share, he is able to perform which action?
Computers And Technology
High School
with specific analytical software describing the data file, any analyst can work on the dataset, regardless of whether that analyst was involved in the research project during its earlier stages or not. true false
« Previous
Page 20
Next »