Answers on questions: Computers and Technology

Computers and Technology
cecilalawson
34
What is the difference between an optical drive and a solid state? A. Optical drives store data ...
Answer
Answers (1)
Computers and Technology
cecilalawson
18
Which of the following methods of computer security prevents operating system attacks originating...
Answer
Answers (2)
Computers and Technology
febby27
64
Your computer is crashing on a regular basis. Which of the following is an operation available to...
Answer
Answers (1)
Computers and Technology
Dwiwahyuni24
26
Which tasks can be completed within the File tab?
Answer
Answers (1)
Computers and Technology
bigfarrah
16
Which option might indicate legal intrusion by a computer professional?
Answer
Answers (2)
Computers and Technology
Lena664
16
What should you always remeber when handling microscope slides
Answer
Answers (1)
Computers and Technology
Ggoanar
143
What is the process in which a server is partitioned into smaller components virtually
Answer
Answers (1)
Computers and Technology
qveenlashayy
68
Which best explains a password attached to a document? There is a private password for the user a...
Answer
Answers (1)
Computers and Technology
KymyattaW
29
indexed sequential access, an index is more useful when the number of record is
Answer
Answers (1)
Computers and Technology
NatashiaKobashigawa
17
Sometimes, fourth-generation languages (4GLs) are called procedural languages
Answer
Answers (1)
Computers and Technology
JeneFindley
20
A file ____ is a small holding section of memory that file-bound information is first written to?
Answer
Answers (1)
Computers and Technology
zoehelenawolf
30
PLEASE HELP!!! WILL GIVE BRAINLIEST IF UR RIGHT Which devices typically generate computer outpu...
Answer
Answers (2)
Computers and Technology
thomasfarms25
19
A typical self-expelling fire extinguisher empties its contents in A. 12–60 seconds. B. ...
Answer
Answers (1)
Computers and Technology
LemuelMarnett
21
What is google main model for generating profit?
Answer
Answers (1)
Computers and Technology
zoehelenawolf
18
PLEASE PLEASE PLEASE HELP!! WILL GIVE BRAINLIEST!! In which situation is it acceptable for an I...
Answer
Answers (2)
Computers and Technology
zoehelenawolf
39
PLEASE HELP!! WILL GIVE BRAINLIEST!! Which scenario best demonstrates how the use of computers...
Answer
Answers (1)
Computers and Technology
AnG7
29
If you are truant in your school attendance your driving privilege is suspended until you provide...
Answer
Answers (1)
Computers and Technology
anette1
69
what feature of excel allows you to automatically calculate common formulas which select data
Answer
Answers (1)
Computers and Technology
vickyandriani67
40
The provides access to the Internet; may also be internal.
Answer
Answers (1)
Computers and Technology
Dman2
35
After earning a learners license what test must be successfully passed to earn an operators licen...
Answer
Answers (1)
Computers and Technology
Dragalas
15
the electomagnetic sprectrum does not contain what
Answer
Answers (1)
Computers and Technology
LeesaVanhevel
14
The action in which a router divides and forwards incoming or outbound message traffic to multipl...
Answer
Answers (1)
Computers and Technology
aims12345
52
When you use your fingerprint on a reader attached to your computer to authenticate yourself as t...
Answer
Answers (1)
Computers and Technology
quinta28
38
When a browser connects to a web server to retrieve a document, what is the default tcp/ip port t...
Answer
Answers (1)
Computers and Technology
jeskiepanal
13
What will happen if a user clears the analytics cookie from their browser?
Answer
Answers (1)