Answers on questions: Computers and Technology

Computers and Technology
brunonatalie04
10
Pressing and holding the what key while dragging a corner handle of an image proportionally resiz...
Answer
Answers (2)
Computers and Technology
Tashina303
29
You're browsing the Internet and realize your browser is not responding. Which of the following w...
Answer
Answers (2)
Computers and Technology
Tashina303
50
In Microsoft Windows, which of the following typically happens by default when a file is "double-...
Answer
Answers (2)
Computers and Technology
tulluru21
16
ORANGE COLORED SIGNS AND FLAGS MEAN THAT YOU MUST BE ALERT FOR: A. Road closuresB. Changed road ...
Answer
Answers (2)
Computers and Technology
tulluru21
54
ASAP:   WHEN DRIVING IN THE FAR RIGHT LANE OF A FREEWAY, YOU: A. Must drive slower than other t...
Answer
Answers (2)
Computers and Technology
Rocky254
23
Since the early versions of x86 computers, the ____ has acted as an interface between hardware an...
Answer
Answers (1)
Computers and Technology
wicson22
27
A(n) ____ drive is a small, portable flash memory device that plugs into any computer with a usb ...
Answer
Answers (1)
Computers and Technology
Pileggi687
48
Which is used to access stored data, allows a user to specify a task without specifying how the t...
Answer
Answers (1)
Computers and Technology
intanmaya200
17
"which protocol would you select if there is only one network route to the remote network?"
Answer
Answers (1)
Computers and Technology
kendrammiller
61
The term isp refers to users who disguise computer viruses as executable programs and send them a...
Answer
Answers (1)
Computers and Technology
Angeleyes678
47
When you develop an application using a 3-layer architecture, the layer that provides the user in...
Answer
Answers (1)
Computers and Technology
imprintpaw
19
How to find someones ip address using their home address?
Answer
Answers (1)
Computers and Technology
bigfuentes
24
What happens to the route connected to a routed port on a multilayer switch when the port goes down?
Answer
Answers (1)
Computers and Technology
Krystaforaberg14
65
When an attacker attempts to gain access to a user's computer by stealing the encrypted file cont...
Answer
Answers (1)
Computers and Technology
fluffyandme18
21
_______ allow(s) you to apply colorful, eye catching designs to a presentation all at once. A...
Answer
Answers (1)
Computers and Technology
Ceri
14
Does magnifier count as assistive technology
Answer
Answers (1)
Computers and Technology
ftmalter
44
To resize columns in a subform, press and hold or right-click the subform in the navigation pane,...
Answer
Answers (1)
Computers and Technology
ma3sho08A
28
If a router receives a packet and it does not have an entry in its routing table for the destinat...
Answer
Answers (1)
Computers and Technology
shay10744brown
19
The cmos memory located on the motherboard is often referred to as _____ memory because of its ca...
Answer
Answers (1)
Computers and Technology
Virani604
18
Prior to the development of e-commerce, web sites primarily delivered static html pages. true
Answer
Answers (1)
Computers and Technology
swan
14
____________________ are malware programs that hide their true nature, and reveal their designed ...
Answer
Answers (1)
Computers and Technology
sarais200
52
Which protocol is used on the world wide web to transmit web pages to web browsers?
Answer
Answers (1)
Computers and Technology
aranzazugon
11
Which line spacing command sets the spacing at a fixed amount that word does not adjust?
Answer
Answers (1)
Computers and Technology
yusef1st
40
Which device enables a portable computer user to have a fast, easy connection to a full-sized key...
Answer
Answers (1)
Computers and Technology
kati
16
Support program files for pc applications often have a(n) ____ extension
Answer
Answers (1)