AssignmentAce
Home
Master Computers and Technology with Fun Quizzes & Brain Teasers!
Computers And Technology
High School
Which of the following is NOT considered file metadata? a. filename b. file creation date c. file contents d. file attributes
Computers And Technology
High School
Which methods can you use to fix a windows 10 computer that has a broken trust relationship with the domain?
Computers And Technology
High School
Classes in c follow the same general syntax pattern as structs, enums, etc.a. Trueb. False
Computers And Technology
High School
The signature of a method consists of ______. A. method name. B. method name and parameter list. C. return type, method name, and parameter list. D. parameter
Computers And Technology
High School
What are the different types of databases and which is the most common?
Computers And Technology
High School
Which type of database organizes data by measure and feature attributes?
Computers And Technology
High School
_________ is a sharp grayscale representation of text used in some e-readers.
Computers And Technology
High School
Which company specializes in working behind the scenes to meet advertisers cpm guarantees by tagging users to create consumer profiles, but is not an ad network?
Computers And Technology
High School
A series of commands that are executed without your knowledge is a typical attribute of a(n) ____________ virus.
Computers And Technology
High School
Why are client/server networks usually installed in businesses?A. Client/server networks are cheaper to install.B. Security is weaker on client/server networksC. They do not require dedicated servers like P2P networks.D. They are more scalable than P2P networks.
Computers And Technology
High School
What C/C++ constant variable can potentially be modified during the execution? a. #define x 5 b. const x = 5; c. Neither (A) nor (B) d. Both (A) and (B)
Computers And Technology
High School
You are an IT technician for your company. Fred calls you complaining that every time he opens his internet browser, the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you run antimalware and antivirus software on Fred's system, it is still having the same issue. Which of the following would be the next BEST way to remove the malware?a. Format Fred's disks and perform a clean installation of the operating system.b. Fred's computer to a known good point.c. Purchase a new disk and deploy a backup image of Windows.d. Restore Fred's computer back to a previous restore point.e. Perform an image deployment from a backup image to restore
Computers And Technology
High School
Which of the following methods can be used for installing the windows operating system? (choose all that apply)1) in-palce upgrade2) resotre/ refresh3) unattended installation4) multiboot5) parted installation
Computers And Technology
High School
A dbms uses ________ to create a query.
Computers And Technology
High School
Consider the following snippet of code in a 32-bit computer.#define max 10struct contact {char name[30];char email[30];int phone;};struct contact A[max];What is the size of the entire array A in bytes?
Computers And Technology
High School
When an object is passed as an argument, ________ is passed into the parameter variable.
Computers And Technology
High School
When a hacker discovers a security hole in software that is unknown to the software vendor, it is an example of?
Computers And Technology
High School
Firewalls work by closing ____ in your computer.
Computers And Technology
High School
What's true about OOP in C++? o One class per .hl.cpp file combination: a. "this" is a pointer in C++ and therefore we use -> to access from it b. In C++ structs are fully OOP but it changes the base assumption of visibility from private to public c. Generally follows a pattern of forward declaration in a .h file and definitions in a .cpp file d. We can directly deference this to use the dot-operator similar to Java: *this.doStuff()
Computers And Technology
High School
Which of the following directories must remain on the same partition? a. /home b. /lib c. /bin d. /etc e. /usr
Computers And Technology
High School
A linux system that is configured to work in graphical mode, what is the run level?
Computers And Technology
High School
In which directory is the route command stored?
Computers And Technology
High School
A relational database table is in ____ normal form if every non-key field is functionally dependent on the primary key.
Computers And Technology
High School
Which command should you use to check if a package is pam-aware?
« Previous
Page 114
Next »