EduAssist
Home
Computers and Technology Quiz & Practice Tests - Test Your Skills
Computers And Technology
High School
write function lengthcompare that takes two string parameters. it returns 1 if the first string has more characters, returns -1 if the second string has more characters, and return 0 if two strings have the same length.
Computers And Technology
College
THE SCENARIO You are a junior IT professional at a small startup company. You have been asked by your manager to prepare the marketing director's iPad and notebook computer for an upcoming conference she is attending. While working on the notebook computer, you noticed that the integrated Wi-Fi adapter is not working. 18 Click to view Windows 10 BACKGROUND It's not easy to find a definition of mobile device that everyone agrees on. However, many would agree on the following. They are Lightweight, usually less than two pounds, Small, designed to move with you in your hand or pocket), Touch or stylus interface; no keyboard or mouse. Sealed unit lacking any user-replaceable parts, Non-desktop Os; mobile devices that use special mobile operating systems and Device variants. Most modern mobile devices fall into one of a few categories: Smartphones Tablets Phablets Wearable technology Other mobile devices are purpose-built to be better at some task such as an e-reader.
Computers And Technology
College
A raw data record is listed below:----|----10---|----20---|----30Printing 750The following SAS program is submitted:data bonus;infile 'file-specification';input dept $ 1 - 11 number 13 - 15;run;Which one of the following SAS statements completes the program and results in a value of 'Printing750' for the DEPARTMENT variable?A. department = trim(dept) || number;B. department = dept || input(number,3.);C. department = trim(dept) || put(number,3.);D. department = input(dept,11.) || input(number,3.)
Computers And Technology
High School
Which command can an administrator issue on a Cisco router to send debug messages to the vty lines?answer choices- terminal monitor- logging console- logging buffered- logging synchronous
Computers And Technology
High School
during a network reconnaissance exercise, chris gains access to a pc located in a secure network. if chris wants to locate database and web servers that the company uses, what command-line tool can he use to gather information about other systems on the local network without sending additional traffic?
Computers And Technology
High School
how many times does the most common source ip address appear in the log? give the count, not the ip address!
Computers And Technology
High School
what propagation problem becomes worse when there is a large, and dense, object between sender and receiver?
Computers And Technology
High School
why should you compare hashes of the files you download from the internet to a library of known hash values?
Computers And Technology
High School
what is the first question you should ask before you start gathering and analyzing data about your website?
Computers And Technology
High School
while there is no single rule as to the size of this network type, which network is usually made up of fewer than 10 computers and rarely more than 20?
Computers And Technology
High School
write a function which returns every other element of the vector passed in. that is, it returns the all odd-numbered elements, starting with the first.
Computers And Technology
High School
network adapters send data packets based on a(n) group of answer choices ip address. frame address. mac address router address
Computers And Technology
High School
which switch cisco ios command moves the user from global config mode to the correct mode to configure a management ip address that exists in vlan 300
Computers And Technology
High School
which of the following are correct names for variables according to java naming conventions? 51) a) findarea b) radius c) radius d) findarea e) radius
Computers And Technology
High School
henry would like to create a different firewall rule that allows encrypted web traffic to reach a web server. what port is used for that communication
Computers And Technology
High School
2. extended subtraction procedure create a procedure named extended sub that subtracts two binary integers of arbitrary size. the storage size of the two integers must be the same, and their size must be a multiple of 32 bits. write a test program that passes several pairs of integers, each at least 10 bytes long.
Computers And Technology
High School
heapsort has heapified an array to: 86 81 52 20 12 48 45 and is about to start the second for loop.what is the array after the first iteration of the second for loop?
Computers And Technology
High School
if a hash table's array is resized to reduce collisions, what must be done to the existing values already in the table? if a hash table's array is resized to reduce collisions, what must be done to the existing values already in the table? all items must be copied over to the same indices in the new array. all n items must be copied over to fill the first n elements of the new array.
Computers And Technology
High School
consider the following sorting algorithm for a list of n elements: starting at the beginning, scan from left to right until an adjacent pair is out of order, then move the smaller of the pair to the head of the list (pushing the intervening elements to the right). start over unless the scan found all elements in order. what is the worst-case number of comparisons for this algorithm?
Computers And Technology
High School
a program that thomas has written is complete. now he is trying to determine ways to test the program for accuracy and fix errors when he finds them. what is this procedure called?codingdevelopmenterror checkdebugging
Computers And Technology
High School
you are a network administrator in an organization that has an azure active directory (ad) network. you need to change an azure ad policy for your users. which powershell command would you use to accomplish this task?
Computers And Technology
High School
which is true? question 16 options: a) private members can be accessed by a class user b) a mutator is also known as a getter method c) a mutator may change class fields d) an accessor is also known as a setter method
Computers And Technology
High School
which functionality should you use to delegate administrative tasks for specific resource groups in azure? classic service management role based access control delegate management console resource group security mode
Computers And Technology
College
Determine all cache accesses and the state of the data cache at any given time. From this you can determine any additional cycles from data cache misses. You must calculate the number of bits for the offset, index, and tag, determine the number of hits and misses, show the contents of the cache, and use the number of misses to determine any additional clock cycles required. The total clock cycles would be the total cycles for all iterations from Part 2 plus any additional memory access cycles from cache misses from Part 3.
« Previous
Page 22
Next »