ProblemPal
Home
Register
Login
Free Computers and Technology Practice Questions - Improve Your Skills
Computers And Technology
High School
if we run the above simpler version of dijkstra's algorithm on a new graph, which has n vertices but only 2n directed weighted edges, what is the runtime?
Computers And Technology
High School
how would software configuration management vary between organizations, depending on project complexity, software process (agile vs waterfall), and degree of risk aversion? g
Computers And Technology
High School
integer and character are examples of a. primitive b. wrapper classes c. unicode character sequences d. methods that can be used to convert to type float
Computers And Technology
High School
if you have multiple classes in your program that have implemented the same interface in different ways, how is the correct method executed? group of answer choices the compiler must determine which method implementation to use. the java virtual machine must locate the correct method by looking at the class of the actual object. you cannot have multiple classes in the same program with different implementations of the same interface. the method must be qualified with the class name to determine the correct method.
Computers And Technology
High School
you are experiencing a problem with one particular server. each time it boots, it goes into single-user mode even though no warnings or errors are reported. you want to verify that it is configured to boot to the multi-user.target unit, just as all your other servers are. this system is running systemd. which command would you use to see which boot target is set as the default? answer systemctl get-default systemctl set-default multi-user.target systemctl isolate multi-user.target systemctl get-default boot.target
Computers And Technology
High School
you are the administrator for an organization that uses a hybrid onsite and azure network. you use microsoft azure log analytics workplace to collect all of the event logs from the computers at your organization. you have a computer named laptop1. laptop1 has windows 10 loaded on the system. you need to view the events collected from laptop1. which query would an administrator run in log analytics?
Computers And Technology
High School
during a review of an outsourced network operations center (noc), an is auditor concludes that procedures to monitor remote network administration activities by the outsourced agency are inadequate. during the management discussion, the chief information officer (cio) justifies this issue as a help desk activity, covered by help desk procedures, and points out that intrusion detection system (ids) logs are activated and firewall rules are monitored. what is the best course of action for the is auditor to take?
Computers And Technology
High School
in the comparison of combinational circuits and sequential circuits, which of the following statements is true? select one: a. combinational circuits use a memory unit; sequential circuits use a memory unit. b. combinational circuits do not use a memory unit; sequential circuits use a memory unit. c. combinational circuits use a memory unit; sequential circuits do not use a memory unit. d. combinational circuits do not use a memory unit; sequential circuits do not use a memory unit.
Computers And Technology
High School
who can access the pages displayed by the account controller shown below? [authorize] public class accountcontroller : controller {} a. anonymous users b. only users who are logged in c. only users who are logged in and members of the authorize role d. all users
Computers And Technology
High School
you have just purchased a new computer that has windows 10 preinstalled. you want to migrate existing users from a previous computer that was running windows xp professional. which files would you use to manage this process through the user state migration tool?
Computers And Technology
High School
there are n people living in a state. in this state, people concatenate their town name before their first name. write an algorithm to find the name of the town of the given n people where the name of the town is the common substring and has the maximum length.
Computers And Technology
College
True or False? In order for the contents of an included file to be treated as html, it must be use the .html file extension
Computers And Technology
College
When two adjacent 1-pixel-wide borders are collapsed together, the width of the resulting border is _____.2-pixels1-pixels4-pixels0.5-pixel
Computers And Technology
College
A transitive trust relationship. In a Windows Active Directory forest, each domain automatically trusts every other domain
Computers And Technology
College
create a view called IBM_InvoiceData that will retrieve columns and rows from the Invoices table for the vendor named IBM.
Computers And Technology
High School
what are some challenges that existing data centers face as they move toward supporting cloud computing? group of answer choices increased it labor costs to manager the cloud environment. greater energy consumption for the same load of applications.
Computers And Technology
High School
what type of algorithm is list indexing an example of? a. constant-time b. logarithmic-time c. exponential-time d. linear-time
Computers And Technology
High School
which attack is typically used specifically against password files that contain cryptographic hashes?
Computers And Technology
High School
the key to a successful research report is a clear and concise presentation that conveys the message of the report and matches the presentation purpose for the data. true false
Computers And Technology
High School
8. write a statement that creates a two-dimensional list with 5 rows and 3 columns. then write nested loops that get an integer value from the user for each element in the list
Computers And Technology
High School
what are some similarities and differences between writing a computer program in java and solving a math word problem?
Computers And Technology
High School
how does the constant of proportionality for an algorithm differ from focusing on the dominant term in big-o analysis?
Computers And Technology
High School
a user on your network has received an error message that there is another computer on the same network using the same ip address, and so the user cannot access the network. you send out a message to the 18 linux users on your network to ask that they check the ip addresses on their computers and e-mail this information to you, so that you can determine who has the duplicate ip address. what utility do you tell users to run to determine their ip addresses?
Computers And Technology
High School
in each blank, enter the list after the given iteration. put one space between each pair of numbers. do not put commas or any other character in your response besides the numbers and spaces. do not put a space at the beginning or end of your response. what will the list be after the first iteration of selection sort? 1 3 2 5 6 4 correct what will the list be after the second iteration of selection sort? 1 2 3 5 6 4 correct
« Previous
Page 31
Next »