EduEureka
Home
Search
Login
Search
Computers and Technology
Computers And Technology
College
Velma receives an email from a stranger who claims he will be receiving a large inheritance soon and will share it with her in exchange for a loan to help him escape his current financial difficulties. He requests that Velma allow him to pay his creditors from her bank account. Velma deletes the email because she recognizes that it represents _____.
Computers And Technology
High School
a programmer writes 500 lines of computer code in 17 days. must there have been at least 1 day when the programmer wrote 30 or more lines of code? why? ---select--- . if the programmer wrote less than 30 lines of code per day for 17 days, then the maximum number of lines that could be written is . since this number is ---select--- 500, it is ---select--- that the programmer wrote 30 or more lines of code during at least one of the 17 days. need help?
Computers And Technology
High School
mary is re-configuring her network that currently uses the standard 10mbps of bandwidth using twisted pair cabling. she wants to upgrade to a faster network. which ethernet standard is most likely currently installed?
Computers And Technology
College
Capitalize words programming challenge description: write a program which capitalizes the first letter of each word in a sentence. input: your program should read lines from standard input. each line has a sequence of words. output: print the capitalized words.
Computers And Technology
High School
Which of the following gives the memory address of integer variable a?A. *a;B. a;C. &a;D. address( a );
Computers And Technology
College
Which of the following statements correctly opens a file in append mode without the need for specifying a close function for the file? O A with open('my_listas file: O with open my list.txt', 'b') as file: OC file = with open('my.list.but, a) OD file with open('my_list.txt. a) QUESTION 9 Which code opens a csv file with semicolon as a delimiter? O A with open('myfile.csv, nas file: csv_data.csv.reader("my_file.csv, delimitery OB. with open('myfile.csv, as file: csv data-sv.reader file, delimiter - OC with open('myfile.csv, nas file: csv_data = csv.reader file, delimiter - semicolon OD with open('my file csv, ) as file csv data=csy reader(file)
Computers And Technology
High School
The SQL command that lets you select attributes from rows in one or more tables or views is ____.a. INSERTb. SELECTc. COMMITd. UPDATE
Computers And Technology
High School
Please help! I need this now!!I own a SanDisk flash drive, and I want to download pictures on it so I can plug into my tv and use them for art references, but when I put the flash drive into my tv, and when I clicked on an image, it say that, "the files are unsupported."Any idea what that means, and how I can fix it?Thanks!
Computers And Technology
High School
When you dereference an object pointer, use thea. dot operatorb. -> operatorc. None of thesed. operatore. & operator
Computers And Technology
College
Please help on this problem about data
Computers And Technology
High School
A system that connects computers throughout the world is a
Computers And Technology
College
Question 20:Which of the following scenarios involve computers making predictions based on the analysis ofpatterns in large data sets?Select two answers.Astate education board analyzing demographic information and academic records to identify students at riskof dropping out of school.The federal government analyzing state spending data to identify which states spent the most on socialservicesA video streaming service analyzing viewer's habits to suggest videos based on the viewing history of otherviewers.An airline analyzing flight records to determine the routes it operates with the least bookings.
Computers And Technology
High School
nadine is the systems administrator for a network with a single subnet. The subnet uses 192.168.1.0 with a mask of 255.255.255.0. The network has 10 servers running Windows Server. Srv1 currently provides both DHCP and DNS services. Nadine wants to increase the fault tolerance for her DHCP servers. She installs a new server, Srv11, and configures it for DHCP. She configures a scope on Srv11 to match the scope on Srv1 and then excludes half of the addresses in the scope on Srv1 and the other half of the addresses on the Srv11. Nadine decides to test her solution and shuts down Srv1. As a test, she forces a workstation to release its IP address and request a new one. She finds that the workstation has the IP address 169.254.0.15 with a mask of 255.255.0.0. What should Nadine do to fix the problem?
Computers And Technology
High School
. Which of the following refers to the informal rules for how to behave online? A.Internet manners (IM)B.profile C.user control D.netiquette
Computers And Technology
College
What power points feature will you use to apply motion effects to different objects of a slide
Computers And Technology
High School
HURRY HURRYHURRY HURRYwhen designing a website whom do you need to consider a. individuals b. yourself c. site owner d. reviewer
Computers And Technology
College
there are several application to assist you to surf through the internet mention three regarding computer
Computers And Technology
College
Design a program that asks the User to enter a series of 5 numbers. The program should store the numbers in a list then display the following data: 1. The lowest number in the list 2. The highest number in the list 3. The total of the numbers in the list 4. The average of the numbers in the list
Computers And Technology
College
Consider the following code snippet:public static void print(E[] a){ for (int i = 0; i < a.length; i++) { System.out.println(a[i] + " "); }}int[] a = {3,6,5,7,8,9,2,3};print(makeArray(a));Assume that the method call to print(makeArray(a)) works correctly by printing the int array a. Which of the following headers for the makeArray method will make this possible?I public static Integer[] makeArray(int[] a)II public static E[] makeArray(int[] a)III public static Integer[] makeArray(E[] a)I and III onlyI onlyI and II onlyII and III onlyWhat does it mean when the syntax ? extends D is used?Any subclass of D may be used.Any superclass of D may be used.Any subclass or superclass of D may be used.This indicates a wildcard with an upper bound.Consider the following code snippet that declares the GraduateStudent class:public GraduateStudent extends Student { . . .}Which of these statements are false?a. I GraduateStudent is a subclass of Studentb. II Stack is a subclass of Stackc. III Stack is a subclass of Stackd. II onlye. III onlyf. II and III onlyg. I only
Computers And Technology
High School
This tool lets you insert text anywhere in your document. O Cut O Drag O Paste
Computers And Technology
High School
Everytime a friend thies. to select something inWindows, she gets a menue popping up Explainto her what she is doing whing and whyshecannotselect the objeto
Computers And Technology
High School
What file format would be required a coworker need to edit a layer in a photoshop file -png -psd-pdf-jpeg
Computers And Technology
College
Make these negative sentences more positive and polite. Keep the meaning.1.Dont run for the bus. You might slip on the ice and fall2.Dont tell me what you cant do.3.Dont eat with your mouth open.4.Dont submit an incomplete report.
Computers And Technology
High School
Use the drop-down menus to complete these sentences.The running of a set of programming instructions multiple times is called .If a sequence of code is repeated multiple times, it is referred to as .One set of coding instructions processing many different sets of data and eliminating multiple lines of code is an example of
« Previous
Page 12
Next »