EduAssist
Home
Computers and Technology Quiz & Practice Tests - Test Your Skills
Computers And Technology
High School
what command must be entered to configure an ip address of 192.168.10.3 and subnet mask of 255.255.255.0 for a switch?
Computers And Technology
High School
what problems does the destructor address? choice 1 of 3:none of these choice 2 of 3:avoiding shallow copy choice 3 of 3:avoiding memory leaks
Computers And Technology
High School
what tool translates java source code into files that contain instructions for the java virtual machine? group of answer choices compiler linker interpreter assembler
Computers And Technology
High School
what is an intrusion detection system/intrusion prevention system (ids/ips) that uses patterns of known malicious activity similar to how antivirus applications work?
Computers And Technology
High School
question 4 a video conferencing application isn't working due to a domain name system (dns) port error. which resource record requires modification to fix the issue?
Computers And Technology
High School
computer a has an overall cpi of 2 and can be run at a clock rate of 600mhz. computer b has a cpi of 2.5 and can be run at a clock rate of 750 mhz. we have a particular program we wish to run. when compiled for computer a, this program has exactly 100,000 instructions. how many instructions would the program need to have when compiled for computer b, in order for the two computers to have exactly the same execution time for this program.
Computers And Technology
High School
9) which of the following statements are true? a. recursive methods run faster than non-recursive methods. b. recursive methods usually take more memory space than non-recursive methods. c. a recursive method can always be replaced by a non-recursive method. d. in some cases, however, using recursion enables you to give a natural, straightforward, simple solution to a program that would otherwise be difficult to solve.
Computers And Technology
High School
match the definition and term. - gain unauthorized access to resources or data or make them available to unauthorized individuals. - check who has logged onto a network, accessed resources, or used group or user privileges. - an attempt to prevent or respond to an attack. - identifying and minimizing possible events that are a danger to the network and data. a. breach b. audit c. countermeasure d. risk management e. threat f. defense in depth
Computers And Technology
High School
the dns is a hierarchical naming system widely used on internet: a) explain how. the domain name space is subdivided and organized into zones b) explain how the resolution mechanism works. make sure to describe the role of root servers play in the process c) explain authoritative and non-authoritative responses from dns servers d) explain what are reverse dns lookups, and how they work
Computers And Technology
High School
which of the following makes ip the most vulnerable? ip packets are broken up into fragments for transmission. ip headers are stripped off and replaced by each router in the path taken by the ip packet. the data in the ip packet is not checked for errors. ip packets do not necessarily arrive in the order in which they were sent.
Computers And Technology
High School
perform a selection sort on the following unsorted list: 3 2 5 6 4 1 in each blank, enter the list after the given iteration. put one space between each pair of numbers. do not put commas or any other character in your response besides the numbers and spaces. do not put a space at the beginning or end of your response. what will the list be after the first iteration of selection sort
Computers And Technology
High School
you are the network administrator for a large company. you have 2 computers that run windows 7. computer 1 has a 32-bit cpu that runs windows 7 enterprise. computer 2 has a 64-bit cpu that runs windows 7 enterprise. you plan to perform an in-place upgrade to the 64-bit version of windows 10. which computers can you upgrade to the 64-bit version of windows 10?
Computers And Technology
High School
unix operating system associates a protection domain with the . a. task b. tread c. process d. user
Computers And Technology
High School
question 4 a data analyst uses the aes() function to define the connection between their data and the plots in their visualization. what argument is used to refer to matching up a specific variable in your data set with a specific aesthetic?
Computers And Technology
High School
what other artifacts would an organization place under configuration management once all the code and code-related artifacts are placed under configuration management?
Computers And Technology
High School
rehearsal adds value by exercising the procedures, identifying shortcomings, and providing security personnel the opportunity to improve the security plan before it is needed. a. true b. false
Computers And Technology
High School
elise is asked to remove a user from the ubuntu server and to have the user's files changed to a different owner. in order to have the files owner changed, what command will ellen need to run?
Computers And Technology
College
Identify the telephone etiquette that will make your telephone calls productive. Check all that apply. Be cheerful and accurate. Use a three-point introduction. Be professional and courteous. Leave complete voice mail messages. Be brisk when rushed.
Computers And Technology
College
Spreadsheets and database software no longer have a place in SCIS as newer tools have supplanted them
Computers And Technology
College
A slow but steady rate of operant responding is associated with the ________ schedule of reinforcement . A ) fixed- ratio B ) fixed - interval C ) variable- ratio D ) variable - interval
Computers And Technology
College
A(n) ____________________ is a device that plugs into a computer system. Examples include modems, digital cameras, and scanners.
Computers And Technology
High School
lucca wants to prevent workstations on his network from attacking each other. if lucca's corporate network looks like the network shown here, what technology should he select to prevent laptop a from being able to attack workstation b?
Computers And Technology
College
What list will be referenced by the variable list_strip after the following code executes?
Computers And Technology
High School
when using icacl in the windows cli, what flag shows that a given user can create files?
« Previous
Page 27
Next »